Pagina 1 di 2 1 2 ultimoultimo
Visualizzazione dei risultati da 1 a 10 su 16
  1. #1

    macos,yosemite,wpscrack.py,python

    ciao
    stavo seguendo l'articolo per testare la sicurezza dei cpe per un progetto europeo
    http://www.html.it/articoli/strument...-wifi-con-wps/

    ho problemi con wpscrack.py non conosco il python e sto andando alla cieca ecco il log dopo che lancio lo script sia da utente che da root

    codice:
    MacBook-Pro-di-Antonio-3:download_wpscrack antonio$ ./wpscrack.py --iface en1 --client e0:f8:47:41:bc:b8 --bssid 00:21:96:69:FB:84 --ssid testap -v
    
    WARNING: No route found for IPv6 destination :: (no default route?)
    sniffer started
    Exception in thread Thread-1:
    Traceback (most recent call last):
      File "/System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/threading.py", line 810, in __bootstrap_inner
        self.run()
      File "/System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/threading.py", line 763, in run
        self.__target(*self.__args, **self.__kwargs)
      File "./wpscrack.py", line 516, in sniffer
        sniff(store=0, stop_filter=lambda x: self.sniffer_filter(x))
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/sendrecv.py", line 561, in sniff
        s = L2socket(type=ETH_P_ALL, *arg, **karg)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 118, in __init__
        self.ins = open_pcap(iface, 1600, self.promisc, 100)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 80, in <lambda>
        open_pcap = lambda *args,**kargs: _PcapWrapper_libpcap(*args,**kargs)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 66, in __init__
        self.pcap.open_live(*args, **kargs)
      File "/usr/local/Cellar/scapy/2.3.1/libexec/vendor/lib/python2.7/site-packages/pcap.py", line 87, in open_live
        def open_live(*args): return _pcap.pcapObject_open_live(*args)
    Exception: en1: You don't have permission to capture on that device ((cannot open BPF device) /dev/bpf0: Permission denied)
    
    Exception RuntimeError: 'pcapObject must be initialized via open_live(), open_offline(), or open_dead() methods' in <bound method _PcapWrapper_libpcap.__del__ of <pcap.pcapObject; proxy of <Swig Object of type 'pcapObject *' at 0x7faad5908180> >> ignored
    ------------------- attempt #1
    Trying 00000000
    -> 802.11 deauthentication
    Traceback (most recent call last):
      File "./wpscrack.py", line 621, in <module>
        main()
      File "./wpscrack.py", line 615, in main
        wps.run()
      File "./wpscrack.py", line 187, in run
        self.send_deauth()
      File "./wpscrack.py", line 552, in send_deauth
        sendp(deauth, verbose=0)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/sendrecv.py", line 259, in sendp
        __gen_send(conf.L2socket(iface=iface, *args, **kargs), x, inter=inter, loop=loop, count=count, verbose=verbose, realtime=realtime)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 303, in __init__
        self.ins = open_pcap(iface, 1600, 0, 100)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 80, in <lambda>
        open_pcap = lambda *args,**kargs: _PcapWrapper_libpcap(*args,**kargs)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 66, in __init__
        self.pcap.open_live(*args, **kargs)
      File "/usr/local/Cellar/scapy/2.3.1/libexec/vendor/lib/python2.7/site-packages/pcap.py", line 87, in open_live
        def open_live(*args): return _pcap.pcapObject_open_live(*args)
    Exception: en1: You don't have permission to capture on that device ((cannot open BPF device) /dev/bpf0: Permission denied)
    TIMEOUT!!
    Exception RuntimeError: 'pcapObject must be initialized via open_live(), open_offline(), or open_dead() methods' in <bound method _PcapWrapper_libpcap.__del__ of <pcap.pcapObject; proxy of <Swig Object of type 'pcapObject *' at 0x7faad5882db0> >> ignored
    MacBook-Pro-di-Antonio-3:download_wpscrack antonio$ clear
    MacBook-Pro-di-Antonio-3:download_wpscrack antonio$ ./wpscrack.py --iface en1 --client e0:f8:47:41:bc:b8 --bssid 00:21:96:69:FB:84 --ssid testap -v
    WARNING: No route found for IPv6 destination :: (no default route?)
    sniffer started
    Exception in thread Thread-1:
    Traceback (most recent call last):
      File "/System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/threading.py", line 810, in __bootstrap_inner
        self.run()
      File "/System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/threading.py", line 763, in run
        self.__target(*self.__args, **self.__kwargs)
      File "./wpscrack.py", line 516, in sniffer
        sniff(store=0, stop_filter=lambda x: self.sniffer_filter(x))
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/sendrecv.py", line 561, in sniff
        s = L2socket(type=ETH_P_ALL, *arg, **karg)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 118, in __init__
        self.ins = open_pcap(iface, 1600, self.promisc, 100)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 80, in <lambda>
        open_pcap = lambda *args,**kargs: _PcapWrapper_libpcap(*args,**kargs)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 66, in __init__
        self.pcap.open_live(*args, **kargs)
      File "/usr/local/Cellar/scapy/2.3.1/libexec/vendor/lib/python2.7/site-packages/pcap.py", line 87, in open_live
        def open_live(*args): return _pcap.pcapObject_open_live(*args)
    Exception: en1: You don't have permission to capture on that device ((cannot open BPF device) /dev/bpf0: Permission denied)
    
    Exception RuntimeError: 'pcapObject must be initialized via open_live(), open_offline(), or open_dead() methods' in <bound method _PcapWrapper_libpcap.__del__ of <pcap.pcapObject; proxy of <Swig Object of type 'pcapObject *' at 0x7f8d326f9440> >> ignored
    ------------------- attempt #1
    Trying 00000000
    -> 802.11 deauthentication
    Traceback (most recent call last):
      File "./wpscrack.py", line 621, in <module>
        main()
      File "./wpscrack.py", line 615, in main
        wps.run()
      File "./wpscrack.py", line 187, in run
        self.send_deauth()
      File "./wpscrack.py", line 552, in send_deauth
        sendp(deauth, verbose=0)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/sendrecv.py", line 259, in sendp
        __gen_send(conf.L2socket(iface=iface, *args, **kargs), x, inter=inter, loop=loop, count=count, verbose=verbose, realtime=realtime)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 303, in __init__
        self.ins = open_pcap(iface, 1600, 0, 100)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 80, in <lambda>
        open_pcap = lambda *args,**kargs: _PcapWrapper_libpcap(*args,**kargs)
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 66, in __init__
        self.pcap.open_live(*args, **kargs)
      File "/usr/local/Cellar/scapy/2.3.1/libexec/vendor/lib/python2.7/site-packages/pcap.py", line 87, in open_live
        def open_live(*args): return _pcap.pcapObject_open_live(*args)
    Exception: en1: You don't have permission to capture on that device ((cannot open BPF device) /dev/bpf0: Permission denied)
    TIMEOUT!!
    Exception RuntimeError: 'pcapObject must be initialized via open_live(), open_offline(), or open_dead() methods' in <bound method _PcapWrapper_libpcap.__del__ of <pcap.pcapObject; proxy of <Swig Object of type 'pcapObject *' at 0x7f8d32584e10> >> ignored

  2. #2
    Da quello che si legge, lo script va eseguito coi privilegi di root, altrimenti non può accedere a /dev/bpf0

  3. #3
    l'ho fatto e da altri errori ...
    ora ti incollo l'output

  4. #4
    bash-3.2# ./wpscrack.py --iface en1 --client e0:f8:47:41:bc:b8 --bssid 00:21:96:69:FB:84 --ssid testap -v
    codice:
    Traceback (most recent call last):
      File "./wpscrack.py", line 11, in <module>
        from scapy.all import *
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/all.py", line 16, in <module>
        from arch import *
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/__init__.py", line 75, in <module>
        from bsd import *
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/bsd.py", line 12, in <module>
        from unix import *
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/unix.py", line 20, in <module>
        from pcapdnet import *
      File "/Library/Python/2.7/site-packages/scapy-2.3.1-py2.7.egg/scapy/arch/pcapdnet.py", line 173, in <module>
        import dnet
    ImportError: No module named dnet

  5. #5
    Manca il modulo dnet. Come l'hai installato lo script? Suppongo manualmente, ergo devi installare pure tutti i moduli di cui necessita.

  6. #6
    tutorial?
    suggerimenti?
    non conosco il python volevo solo lanciare lo script non capisco cosa siano questi moduli ...

  7. #7
    Beh c'è una buona guida qui http://www.html.it/guide/guida-python/

  8. #8
    ok, pensavo fosse + facile lavorare con python ... se ti viene in mente una soluzione + facile fammi sapere grazie
    il mio obbiettivo è testare la sicurezza della mia wpa e dei miei clienti e magari trovare la wpa come obbiettivo primario ... non era quello di imparare python il mio obbiettivo ... tralaltro non è richiesto da nessuna parte il python ... non mi sembra un buon investimento ...

  9. #9
    mi hanno suggerito anche
    riven e akali ... tu li hai provati?


  10. #10
    Mai sentiti. In ogni caso quello è uno script, ragion per cui una conoscenza del linguaggio è fondamentale. Nel tuo caso ci vuole un programma da usare e basta. Per la cronaca esiste una distribuzione Linux creata apposta, si chiama Kali Linux e contiene una valanga di programmi per il penetration testing.

    p.s. python è usatissimo in svariati campi, tra cui quello scientifico. E' uno dei 3 linguaggi richiesti da Google se si vuole essere assunti.

Tag per questa discussione

Permessi di invio

  • Non puoi inserire discussioni
  • Non puoi inserire repliche
  • Non puoi inserire allegati
  • Non puoi modificare i tuoi messaggi
  •  
Powered by vBulletin® Version 4.2.1
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.