New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tried from macOS and virtualbox Centos7, without success.. #4
Comments
I also failed and I tried another script and succeeded. The difference is that line 17 of ppppd-cve.py is commented out. if src.startswith("88:c3:97") or src.startswith("8c:53:c3") :
src,dst = dst,src to #if src.startswith("88:c3:97") or src.startswith("8c:53:c3") :
src,dst = dst,src Have a try? |
I also assume this might be mac address related. @rusnino does it start with |
The MAC address of my router starts with "28:d1:27". It seems that @rusnino's MAC starts with "50:d2:f5". I think it can be very different. Maybe the if-condition is not required? |
Yes, router MAC is different, it starts with |
adding this to |
@rusnino cool, I will update the guide to close this issue. |
Hello, there is my outputs, also seeking some packets in wireshark, but no specific packets to port 31337 received.
What is the additional conditions to exploit working? maybe Xiaomi fixed it in recent ships?
The text was updated successfully, but these errors were encountered: