You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
wsf > use arp_spoof
wsf > arp_spoof > set target 79.174.35.109
target (there was my target)
wsf > arp_spoof > execute
Traceback (most recent call last):
File "/usr/bin/websploit", line 33, in
sys.exit(load_entry_point('websploit==4.0.4', 'console_scripts', 'websploit')())
File "/usr/lib/python3/dist-packages/websploit/websploit.py", line 74, in start_wsf
Main().cmdloop()
File "/usr/lib/python3.10/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.10/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/lib/python3/dist-packages/websploit/websploit.py", line 35, in do_use
module.cmdloop()
File "/usr/lib/python3.10/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.10/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/lib/python3/dist-packages/websploit/modules/arp_spoof.py", line 24, in do_execute
self._spoof(target=self.parameters['target'], getway=self.parameters['gateway'])
File "/usr/lib/python3/dist-packages/websploit/modules/arp_spoof.py", line 37, in _spoof
target_mac = get_mac(ip=target)
File "/usr/lib/python3/dist-packages/websploit/core/utils/tools.py", line 7, in get_mac
ans, _ = srp(Ether(dst='ff:ff:ff:ff:ff:ff')/ARP(pdst=ip), timeout=3, verbose=0)
File "/usr/lib/python3/dist-packages/scapy/sendrecv.py", line 552, in srp
s = conf.L2socket(promisc=promisc, iface=iface,
File "/usr/lib/python3/dist-packages/scapy/arch/linux.py", line 410, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type)) # noqa: E501
File "/usr/lib/python3.10/socket.py", line 232, in init
_socket.socket.init(self, family, type, proto, fileno)
OSError: [Errno 97] Address family not supported by protocol
The text was updated successfully, but these errors were encountered:
wsf > use arp_spoof
wsf > arp_spoof > set target 79.174.35.109
target (there was my target)
wsf > arp_spoof > execute
Traceback (most recent call last):
File "/usr/bin/websploit", line 33, in
sys.exit(load_entry_point('websploit==4.0.4', 'console_scripts', 'websploit')())
File "/usr/lib/python3/dist-packages/websploit/websploit.py", line 74, in start_wsf
Main().cmdloop()
File "/usr/lib/python3.10/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.10/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/lib/python3/dist-packages/websploit/websploit.py", line 35, in do_use
module.cmdloop()
File "/usr/lib/python3.10/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.10/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/lib/python3/dist-packages/websploit/modules/arp_spoof.py", line 24, in do_execute
self._spoof(target=self.parameters['target'], getway=self.parameters['gateway'])
File "/usr/lib/python3/dist-packages/websploit/modules/arp_spoof.py", line 37, in _spoof
target_mac = get_mac(ip=target)
File "/usr/lib/python3/dist-packages/websploit/core/utils/tools.py", line 7, in get_mac
ans, _ = srp(Ether(dst='ff:ff:ff:ff:ff:ff')/ARP(pdst=ip), timeout=3, verbose=0)
File "/usr/lib/python3/dist-packages/scapy/sendrecv.py", line 552, in srp
s = conf.L2socket(promisc=promisc, iface=iface,
File "/usr/lib/python3/dist-packages/scapy/arch/linux.py", line 410, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type)) # noqa: E501
File "/usr/lib/python3.10/socket.py", line 232, in init
_socket.socket.init(self, family, type, proto, fileno)
OSError: [Errno 97] Address family not supported by protocol
The text was updated successfully, but these errors were encountered: