new: dhcp6 spoofer step 1: get solicit packets and send spoofed advertisements.

This commit is contained in:
evilsocket 2018-01-12 19:54:36 +01:00
commit da57450315
8 changed files with 317 additions and 3 deletions

View file

@ -9,7 +9,7 @@ import (
const (
PromptVariable = "$"
DefaultPrompt = "{by}{fw}{cidr} {fb}> {env.iface.address} {reset} {bold}» {reset}"
DefaultPrompt = "{by}{fw}{cidr} {fb}> {env.iface.ipv4} {reset} {bold}» {reset}"
)
var PromptEffects = map[string]string{

View file

@ -170,7 +170,8 @@ func (s *Session) Start() error {
s.Env.Set(PromptVariable, DefaultPrompt)
s.Env.Set("iface.name", s.Interface.Name())
s.Env.Set("iface.address", s.Interface.IpAddress)
s.Env.Set("iface.ipv4", s.Interface.IpAddress)
s.Env.Set("iface.ipv6", s.Interface.Ip6Address)
s.Env.Set("iface.mac", s.Interface.HwAddress)
if s.Queue, err = packets.NewQueue(s.Interface.Name()); err != nil {