From c2aefc699be6f9a5a19e4b8ab541ae2ffcf7dd69 Mon Sep 17 00:00:00 2001 From: Eric Gragsone Date: Fri, 7 Sep 2018 13:17:36 -0400 Subject: [PATCH] Updated Readme --- README.md | 32 ++++++++++++++++++++++++-------- 1 file changed, 24 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index cbc00e6..d976184 100644 --- a/README.md +++ b/README.md @@ -2,13 +2,27 @@ Passive network reconnaissance relying on Multicast Protocols -## Plan +## Current Features -Create a set of parsers for multicast protocols such as mDNS and UPnP for -extracting environmental awareness and to use these findings to seed an Armitage -dashboard for red team engagements +Parses out the following information: +* Battlenet - Grabs Battlenet Username +* Dropbox - Lists the number of files, Dropbox LAN Sync Port +* DHCP - DNS Server, Default Gateway, DHCP Server, Device Type/OS +* mDNS - Service Ports, Device Type/OS, Host Name +* SSDP - Service Ports, URLs, Chrome Browser Versions and other user agents +* Teredo - Service Port, Endpoints +* WSD - Nothing Really -* precon_priv - Sniffer based package the requires promisc permissions +Saves a report of collected information + +Saves unknown protocols as ai.pcap + +Saves session information as data.json + +## Planned Features + +* Parse more protocols +* Integrate these findings findings to Armitage/Metasploit for red team engagements * precon_user - Daemon based package that can run as any user ## Dependancies @@ -21,10 +35,12 @@ Currently depends on ## Usage -With promisc privledges, run python precon.py +With promisc privledges, run python precon.py (sudo python repcon.py) -In the current state it'll print new information it's discovered. +Precon logs to console any new information discovered -Additionally it'll save an unparsed packets as ai_log.pcap +Saves unparsed packets as ai.pcap Writes out to report.txt on exit, or hit return if you want a report without quitting + +Additionally saves session information to data.json. IMPORTANT, remove this file if you've changed networks