This guide provides a comprehensive list of all command line options available in GoSpoof.

Basic Options

OptionDescriptionDefaultExample
-pBind to a particular PORT number”4444”-p 4444
-iBind to a particular IP addressSystem IP-i 192.168.1.100
-DRun as daemon processNone-D

Port Configuration

OptionDescriptionDefaultExample
-sPProvide a range of ports (1-10), list (1,9,32), or single port”1-65535”-sP "1-1000"
-sTSetup iptables to bind to a single portNone-sT 4444
-rPort range for iptables to redirect from (format: low:high)“1:65535”-r "1:1000"
-fTReset iptablesNone-fT

Advanced Features

OptionDescriptionDefaultExample
-honeyActivate Honeypot Mode (use -honey Y)Off-honey Y
-tThrottle time for scan (1-5, where 1=5min, 5=80min)None-t 3
-wSeconds to wait between sending signaturesNone-w 5
-rgRubber glue mode (tunnels attacks back at intruder)Off-rg
-eExclude specific ports from spoofingNone-e 22,80,443

Boot Configuration

OptionDescriptionDefaultExample
--bootSave configuration and start on bootNone--boot
-rmRemove boot configuration and serviceNone-rm

Configuration and Logging

OptionDescriptionDefaultExample
-YLoad configuration from YAML fileNone-Y config.yaml
-lLog port scanning alerts to a fileNone-l /path/to/log.log
-sGo-spoof service signature regex fileNone-s path/to/signatures.txt
--WebUILaunch the GoSpoof Command CenterNone--WebUI

Option Details

Port Configuration

  • -p: Specifies the port that GoSpoof will listen on. This is the port where all redirected traffic will be received.
  • -sP: Allows you to specify which ports GoSpoof should respond to. Can be a range (1-1000), a list (1,9,32), or a single port.
  • -sT: Sets up iptables to redirect traffic to a single port. Must be used with -p to specify the target port.
  • -r: When used with -sT, specifies the range of ports that iptables should redirect from.

Advanced Features

  • -honey: Enables honeypot mode, which logs attacker IPs, timestamps, and payloads to honeypot.log.
  • -t: Controls scan throttling, with levels 1-5 providing increasing delays (1=5min, 5=80min).
  • -w: Adds a delay between sending signatures, useful for slowing down scanning tools.
  • -rg: Enables rubber glue mode, which tunnels attacks back at the intruder.
  • -e: Excludes specified ports from spoofing, allowing legitimate services to run normally.

Boot Configuration

  • --boot: Saves the current configuration and sets up GoSpoof to start automatically on system boot.
  • -rm: Removes all saved boot configurations and provides a complete fresh start.

Configuration

  • -Y: Loads configuration from a YAML file, allowing for more complex setups.
  • -l: Specifies a file to log port scanning alerts.
  • -s: Allows loading custom service signature patterns from a file.
  • --WebUI: Launches the GoSpoof Command Center web interface for visual management and monitoring.

Common Usage Examples

Basic Setup

# Start with default settings
./goSpoof
 
# Start on specific port
./goSpoof -p 4444
 
# Bind to specific IP
./goSpoof -i 192.168.1.100

iptables Configuration

# Setup iptables redirection
./goSpoof -sT 4444 -p 4444
 
# Setup with custom port range
./goSpoof -sT 4444 -r "1:1000" -p 4444
 
# Reset iptables rules
./goSpoof -fT

Port Range Configuration

# Custom port range
./goSpoof -sP "1-1000" -p 4444
 
# Specific ports only
./goSpoof -sP "22,80,443" -p 4444

Advanced Configuration

# Full feature deployment
./goSpoof -D -Y config.yaml -l /var/log/gospoof.log -honey Y
 
# Maximum throttling
./goSpoof -t 5 -w 10 -honey Y
 

Specialized Modes

# Honeypot mode only
./goSpoof -honey Y
 
# Rubber glue mode (standalone)
./goSpoof -rg
 
# Verbose debugging
./goSpoof -p 4444
 
# Custom signatures
./goSpoof -s path/to/signatures.txt -p 4444
 
# Exclude critical ports
./goSpoof -e 22,80,443 -p 4444
 
# Setup persistent boot configuration
./goSpoof -p 4444 -sT 4444 -honey Y --boot
 
# Remove boot configuration
./goSpoof -rm

Individual Flag Documentation

For detailed information about each flag, see the individual documentation pages:

Basic Options

Port Configuration

Advanced Features

Configuration and Logging

Boot Configuration

Next Steps

Additional Reading