ownlan 0.4.0 → 0.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/Gemfile.lock +1 -1
- data/README.md +6 -8
- data/lib/ownlan/cli.rb +7 -7
- data/lib/ownlan/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: de47556689ff2bd8200ab6563f0db9bdea19e791
|
4
|
+
data.tar.gz: 8640d8eb85dbc44ee0f88976a9f50bbc7f264330
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b96ce1e8048d204aaa198e22ebe89a45448e8d4013fa6dc2f6282d7a8d2306204c244a4212380ca5cb276d585bd0a669699d3dc2cc1bb92bbe7a5afbe64e6ebb
|
7
|
+
data.tar.gz: 497ffa054999873ba3e73c54872dac8f3ead35e0bf9a629b2331485efac2bd8f242296b59ee5b93bae02b6def469e13ec91a2948bc047e0e86506946e2252a21
|
data/Gemfile.lock
CHANGED
data/README.md
CHANGED
@@ -112,26 +112,24 @@ You can also use the provided executable. Simple launch it in accordance to the
|
|
112
112
|
|
113
113
|
client Set a First-Duplex disconnection attack (the client is targeted). If no source mac argument, yours will be given (useful for MITM Attacks).
|
114
114
|
* Required options: victim_ip
|
115
|
-
* Falcultative options:
|
115
|
+
* Falcultative options: random_mac , source_mac
|
116
116
|
gateway Set a Second-Duplex disconnection attack (the gateway is targeted). If no source mac argument, yours will be given (useful for MITM Attacks).
|
117
117
|
* Required options: victim_ip
|
118
|
-
* Falcultative options:
|
118
|
+
* Falcultative options: random_mac , source_mac
|
119
119
|
ntoa The client is targeted to get disconnected, using a neighbour table overflow attack. Requires a victim ip.
|
120
120
|
* Required options: victim_ip
|
121
|
-
* Falcultative options:
|
121
|
+
* Falcultative options: random_mac
|
122
122
|
fake-ip-conflict Generate a fake ip conflict to the victim. Can be used along all the others attacks, or alone.
|
123
123
|
* Required options: victim_ip [Not Implemented]
|
124
124
|
|
125
|
-
resynchronize
|
125
|
+
resynchronize Operate a dual duplex attack on a victim to disconnect the attacker and heal the victim. Warning: If you are the victim, you will have to fill the optional options.
|
126
|
+
* Required options: victim_ip
|
126
127
|
* Optional options: victim_mac , gateway_mac
|
127
128
|
stealth Becomes invisible from network scanners, preventing you from getting targeted. [Not Implemented]
|
128
129
|
static Set a static ARP Cache for the current session. Good against first-duplex ARP Cache Poisoning. [Not Implemented]
|
129
130
|
freeze Reset and Freeze your ARP Cache. Good against NTOAs. [Not Implemented]
|
130
131
|
|
131
132
|
|
132
|
-
attack. (reveive IP or MAC argument)
|
133
|
-
|
134
|
-
|
135
133
|
- Where [Other Options] can be:
|
136
134
|
|
137
135
|
|
@@ -142,7 +140,7 @@ You can also use the provided executable. Simple launch it in accordance to the
|
|
142
140
|
-v, --victim-mac=<s> Set the mac address of the target
|
143
141
|
-g, --gateway-ip=<s> Set the ip adress of the gateway
|
144
142
|
-e, --gateway-mac=<s> Set the mac adress of the gateway. (for Protect only)
|
145
|
-
-s, --source-mac=<s> Set the mac of the source mac address.
|
143
|
+
-s, --source-mac=<s> Set the mac of the source mac address.
|
146
144
|
-o, --source-ip=<s> Set the ip address of the originating packet.
|
147
145
|
-n, --version Print version and exit
|
148
146
|
-h, --help Show this message
|
data/lib/ownlan/cli.rb
CHANGED
@@ -31,13 +31,13 @@ where [sub-options] are either:
|
|
31
31
|
Attacks sub-options:
|
32
32
|
client Set a First-Duplex disconnection attack (the client is targeted). If no source mac argument, yours will be given (useful for MITM Attacks).
|
33
33
|
* Required options: victim_ip
|
34
|
-
* Falcultative options:
|
34
|
+
* Falcultative options: random_mac , source_mac
|
35
35
|
gateway Set a Second-Duplex disconnection attack (the gateway is targeted). If no source mac argument, yours will be given (useful for MITM Attacks).
|
36
36
|
* Required options: victim_ip
|
37
|
-
* Falcultative options:
|
37
|
+
* Falcultative options: random_mac , source_mac
|
38
38
|
ntoa The client is targeted to get disconnected, using a neighbour table overflow attack. Requires a victim ip.
|
39
39
|
* Required options: victim_ip
|
40
|
-
* Falcultative options:
|
40
|
+
* Falcultative options: random_mac
|
41
41
|
fake-ip-conflict Generate a fake ip conflict to the victim. Can be used along all the others attacks, or alone.
|
42
42
|
* Required options: victim_ip
|
43
43
|
EOS
|
@@ -50,9 +50,9 @@ Protect sub-options:
|
|
50
50
|
stealth Becomes invisible from network scanners, preventing you from getting targeted.
|
51
51
|
static Set a static ARP Cache for the current session. Good against first-duplex ARP Cache Poisoning.
|
52
52
|
freeze Reset and Freeze your ARP Cache. Good against NTOAs.
|
53
|
-
resynchronize
|
54
|
-
* Required options:
|
55
|
-
* Optional options:
|
53
|
+
resynchronize Operate a dual duplex attack on a victim to disconnect the attacker and heal the victim. Warning: If you are the victim, you will have to fill the optional options.
|
54
|
+
* Required options: victim_ip
|
55
|
+
* Optional options: victim_mac , gateway_mac
|
56
56
|
|
57
57
|
EOS
|
58
58
|
|
@@ -78,7 +78,7 @@ Other Options:
|
|
78
78
|
|
79
79
|
opt :delay, "Set the time lapse delay between each packet", default: 0.5
|
80
80
|
opt :interface, "Set the network interface which will be used", short: 'i', default: 'wlan0'
|
81
|
-
opt :
|
81
|
+
opt :random_mac, "If setted, the used origin addresses will be randomly generated."
|
82
82
|
opt :victim_ip, "Set the ip address of the target.", short: 't', type: :string
|
83
83
|
opt :victim_mac, "Set the mac address of the target", type: :string
|
84
84
|
opt :gateway_ip, "Set the ip adress of the gateway", type: :string
|
data/lib/ownlan/version.rb
CHANGED