From 47049b95b5d05383abcc0e344e9a87b96be3a095 Mon Sep 17 00:00:00 2001 From: Ivan Tse Date: Mon, 17 Jun 2024 12:20:41 -0400 Subject: [PATCH] docs: fix description for responseReboundIPAddrtimeOut This timeout means that the DNS server will revert to responding with ResponseIPAddr. --- cmd/singularity-server/main.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cmd/singularity-server/main.go b/cmd/singularity-server/main.go index 641834e..23bea88 100644 --- a/cmd/singularity-server/main.go +++ b/cmd/singularity-server/main.go @@ -38,7 +38,7 @@ func initFromCmdLine() *singularity.AppConfig { var responseReboundIPAddr = flag.String("ResponseReboundIPAddr", "127.0.0.1", "Specify the victim host IP address that is rebound from the attacker host address") var responseReboundIPAddrtimeOut = flag.Int("responseReboundIPAddrtimeOut", 300, - "Specify delay (s) for which we will keep responding with Rebound IP Address after last query. After delay, we will respond with ResponseReboundIPAddr.") + "Specify delay (s) for which we will keep responding with Rebound IP Address after last query. After delay, we will respond with ResponseIPAddr.") var dangerouslyAllowDynamicHTTPServers = flag.Bool("dangerouslyAllowDynamicHTTPServers", false, "DANGEROUS if the flag is set (to anything). Specify if any target can dynamically request Singularity to allocate an HTTP Server on a new port.") var WsHttpProxyServerPort = flag.Int("WsHttpProxyServerPort", 3129, "Specify the attacker HTTP Proxy Server and Websockets port that permits to browse hijacked client services.")