README.md in ownlan-0.4.0 vs README.md in ownlan-0.4.1
- old
+ new
@@ -110,40 +110,38 @@
- where [sub-options] are either:
client Set a First-Duplex disconnection attack (the client is targeted). If no source mac argument, yours will be given (useful for MITM Attacks).
* Required options: victim_ip
- * Falcultative options: random_source_mac , source_mac
+ * Falcultative options: random_mac , source_mac
gateway Set a Second-Duplex disconnection attack (the gateway is targeted). If no source mac argument, yours will be given (useful for MITM Attacks).
* Required options: victim_ip
- * Falcultative options: random_source_mac , source_mac
+ * Falcultative options: random_mac , source_mac
ntoa The client is targeted to get disconnected, using a neighbour table overflow attack. Requires a victim ip.
* Required options: victim_ip
- * Falcultative options: random_source_mac
+ * Falcultative options: random_mac
fake-ip-conflict Generate a fake ip conflict to the victim. Can be used along all the others attacks, or alone.
* Required options: victim_ip [Not Implemented]
- resynchronize Resynchronize the Gateway ARP Cache by sending to it continuous healthy correspondancies packets to protect someone or yourself from gateway. Default params are your mac and the gateway's mac. WARNING: If your gateway_mac is the attacker's, this protection won't work. In this case, input the gateway's mac manually.
+ resynchronize Operate a dual duplex attack on a victim to disconnect the attacker and heal the victim. Warning: If you are the victim, you will have to fill the optional options.
+ * Required options: victim_ip
* Optional options: victim_mac , gateway_mac
stealth Becomes invisible from network scanners, preventing you from getting targeted. [Not Implemented]
static Set a static ARP Cache for the current session. Good against first-duplex ARP Cache Poisoning. [Not Implemented]
freeze Reset and Freeze your ARP Cache. Good against NTOAs. [Not Implemented]
- attack. (reveive IP or MAC argument)
-
-
- Where [Other Options] can be:
-d, --delay=<f> Set the time lapse delay between each packet (default: 0.5)
-i, --interface=<s> Set the network interface which will be used (default: wlan0)
-r, --random-source-mac If setted, the used origin addresses will be randomly generated.
-t, --victim-ip=<s> Set the ip address of the target.
-v, --victim-mac=<s> Set the mac address of the target
-g, --gateway-ip=<s> Set the ip adress of the gateway
-e, --gateway-mac=<s> Set the mac adress of the gateway. (for Protect only)
- -s, --source-mac=<s> Set the mac of the source mac address. Default: Your mac address for wlan0 (00:c0:ca:69:0f:a9)
+ -s, --source-mac=<s> Set the mac of the source mac address.
-o, --source-ip=<s> Set the ip address of the originating packet.
-n, --version Print version and exit
-h, --help Show this message