DanMcInerney / icebreaker

Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment
MIT License
1.18k stars 170 forks source link

Feature request: allow option to specify an interface to attack #1

Closed LukeWilladsen closed 6 years ago

LukeWilladsen commented 6 years ago

Very cool tool! Just having this one minor issue.

I am specifying a host list that has only targets that can be reached via eth1 on my machine, but it is starting responder to only listen on eth0. I don't have the option of specifying which interface I want.

[Responder] 01/22/2018 03:44:02 PM - Responder Started: ['submodules/Responder/Responder.py', '-wrd', '-I', 'eth0']

DanMcInerney commented 6 years ago

Ah, yeah, my interface detection is weak at the moment. I'll fix this soon. If you want to manually bypass this for the moment you can edit line 725 and line 735 from iface = get_iface() to iface = "eth1"

On Mon, Jan 22, 2018 at 1:46 PM, LukeWilladsen notifications@github.com wrote:

Very cool tool! Just having this one minor issue.

I am specifying a host list that has only targets that can be reached via eth1 on my machine, but it is starting responder to only listen on eth0. I don't have the option of specifying which interface I want.

[Responder] 01/22/2018 03:44:02 PM - Responder Started: ['submodules/Responder/Responder.py', '-wrd', '-I', 'eth0']

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/DanMcInerney/icebreaker/issues/1, or mute the thread https://github.com/notifications/unsubscribe-auth/ABuspRXXB3R7FWW_FeEbw6zzNHyAVxR9ks5tNPOTgaJpZM4Rom-_ .

DanMcInerney commented 6 years ago

Done. -i option will work now.