Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

errors and cannot obtain ip address #70

Open
jeretc opened this issue Nov 14, 2016 · 0 comments
Open

errors and cannot obtain ip address #70

jeretc opened this issue Nov 14, 2016 · 0 comments

Comments

@jeretc
Copy link

jeretc commented Nov 14, 2016

hi there are few errors with mana-toolkit, and also it fails to obtain ip address. script run was "start-noupstream.sh". I'm using a supported wifi card tplink 722n. configuration has been changed to wlan1 for my wifi card. here are the errors ...

dnsmasq: Symbol `nettle_hashes' has different size in shared object, consider re-linking
dnsmasq: junk found in command line
dnsspoof: listening on wlan1 [udp dst port 53 and not src 10.0.0.1]
Hit enter to kill me


the script continues to run with metasploit but with errors again ..

[*] Auxiliary module running as background job
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
stty: 'standard input': Inappropriate ioctl for device
msf auxiliary(psnuffle) > stty: 'standard input': Inappropriate ioctl for device

[] Loaded protocol FTP from /usr/share/metasploit-framework/data/exploits/psnuffle/ftp.rb...
[
] Loaded protocol IMAP from /usr/share/metasploit-framework/data/exploits/psnuffle/imap.rb...
[] Loaded protocol POP3 from /usr/share/metasploit-framework/data/exploits/psnuffle/pop3.rb...
[
] Loaded protocol SMB from /usr/share/metasploit-framework/data/exploits/psnuffle/smb.rb...
[] Loaded protocol URL from /usr/share/metasploit-framework/data/exploits/psnuffle/url.rb...
[
] Sniffing traffic.....
[] Server stopped.
[
] Server stopped.
[] Server stopped.
[
] Server stopped.
[] Server stopped.
[
] Server stopped.
[] Server stopped.
[
] Server stopped.
[] Server stopped.
[
] Server stopped.
[] Server stopped.
[
] Server stopped.
[] Server stopped.
[
] Server stopped.
[] Server stopped.
[
] Server stopped.
[*] Server stopped.


the script continues to run ... wifi access point showing up but fails to obtain ip address.

any help??

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant