fix: net.recon module is now enabled by default

This commit is contained in:
evilsocket 2018-01-27 21:13:49 +01:00
parent b956d644a9
commit 9a0f85b8bd
16 changed files with 4 additions and 21 deletions

View file

@ -10,6 +10,5 @@ events.clear
set events.stream.filter target.
events.stream on
net.recon on
api.rest on
net.sniff on

View file

@ -4,8 +4,6 @@
# inject beef hook
set http.proxy.script caplets/beef-inject.js
# keep reading arp table for network mapping
net.recon on
# redirect http traffic to a proxy
http.proxy on
# wait for everything to start properly

View file

@ -1,7 +1,5 @@
# inject beef hook
set http.proxy.script caplets/beef-inject.js
# keep reading arp table for network mapping
net.recon on
# redirect http traffic to a proxy
http.proxy on
# wait for everything to start properly

View file

@ -4,7 +4,6 @@
# events.stream off
net.recon on
net.probe on
sleep 1
net.probe off

View file

@ -3,7 +3,6 @@
# sudo ./bettercap-ng -caplet caplets/login-man-abuse.cap -eval "set arp.spoof.targets 192.168.1.53"
set http.proxy.script caplets/login-man-abuse.js
net.recon on
http.proxy on
sleep 1
arp.spoof on

View file

@ -6,8 +6,6 @@ set dhcp6.spoof.domains microsoft.com, google.com
# let's give em some contents
set http.server.path caplets/www
# check who's alive on the network
net.recon on
# serve files
http.server on
# redirect DNS request by spoofing DHCPv6 packets

View file

@ -1,4 +1,3 @@
net.recon on
net.probe on
clear
ticker on

View file

@ -1,5 +1,4 @@
net.probe on
net.recon on
sleep 5
net.show
quit

View file

@ -1,4 +1,3 @@
net.recon on
sleep 1
net.show
quit

View file

@ -4,6 +4,5 @@ set api.rest.password bcap
# set api.rest.port 8082
net.probe on
net.recon on
api.rest on

View file

@ -1,6 +1,3 @@
# keep reading arp table for network mapping
net.recon on
set net.sniff.regexp .*password=.+
set net.sniff.output passwords.cap

View file

@ -8,8 +8,6 @@ set http.proxy.script caplets/beef-inject.js
# let's give em some contents
set http.server.path caplets/www
# check who's alive on the network
net.recon on
# serve files
http.server on
# redirect DNS request by spoofing DHCPv6 packets

View file

@ -3,7 +3,6 @@
# sudo ./bettercap-ng -caplet caplets/web-override.cap -eval "set arp.spoof.targets 192.168.1.64"
set http.proxy.script caplets/web-override.js
net.recon on
http.proxy on
arp.spoof on
events.clear

View file

@ -4,7 +4,7 @@ function onRequest(req, res) {
res.Status = 200;
res.ContentType = "text/html";
res.Headers = "Connection: close";
res.Body = readFile("caplets/web-override.html");
res.Body = readFile("caplets/www/index.html");
res.Updated();
}

View file

@ -41,6 +41,8 @@ func main() {
if err = sess.Run("events.stream on"); err != nil {
log.Fatal("%", err)
} else if err = sess.Run("net.recon on"); err != nil {
log.Fatal("%", err)
}
defer sess.Close()

View file

@ -82,7 +82,7 @@ func (t *Ticker) Start() error {
t.SetRunning(true)
go func() {
log.Info("Ticker running with period %ds.", t.Period)
log.Info("Ticker running with period %ds.", t.Period.Seconds())
tick := time.Tick(t.Period)
for _ = range tick {
if t.Running() == false {