Giter VIP home page Giter VIP logo

sniffair's Introduction

SniffAir

SniffAir is an open-source wireless security framework which provides the ability to easily parse passively collected wireless data as well as launch sophisticated wireless attacks. SniffAir takes care of the hassle associated with managing large or multiple pcap files while thoroughly cross-examining and analyzing the traffic, looking for potential security flaws. Along with the prebuilt queries, SniffAir allows users to create custom queries for analyzing the wireless data stored in the backend SQL database. SniffAir is built on the concept of using these queries to extract data for wireless penetration test reports. The data can also be leveraged in setting up sophisticated wireless attacks included in SniffAir as modules.

SniffAir is developed by @Tyl0us and @theDarracott

Install


SniffAir was developed with Python version 2.7

Tested and supported on Kali Linux, Debian and Ubuntu.

To install run the setup.sh script

$./setup.sh

Usage



                                                                     % *        ., %                         
                                                                    % ( ,#     (..# %                        
    /@@@@@&,    *@@%        &@,    @@#    /@@@@@@@@@   .@@@@@@@@@. ,/ # # (%%%* % (.(.  .@@     &@@@@@@%.    
  .@@&   *&@    %@@@@.      &@,    @@%    %@@,,,,,,,   ,@@,,,,,,,  .( % %  %%#  # % #   ,@@     @@(,,,#@@@.  
  %@%           %@@(@@.     &@,    @@%    %@@          ,@@          /* #   /*,   %.,,   ,@@     @@*     #@@  
  ,@@&          %@@ ,@@*    &@,    @@%    %@@          ,@@           .#   //#(,   (,    ,@@     @@*     &@%  
   .@@@@@.      %@@  .@@(   &@,    @@%    %@@%%%%%%*   ,@@%%%%%%#         (# ##.        ,@@     @@&%%%@@@%   
       *@@@@    %@@   .@@/  &@,    @@%    %@@,,,,,,    ,@@,,,,,,.        %#####%        ,@@     @@(,,%@@%    
          @@%   %@@     @@( &@,    @@%    %@@          ,@@              %  (*/  #       ,@@     @@*    @@@   
          %@%   %@@      @@&&@,    @@%    %@@          ,@@             %  #  .# .#      ,@@     @@*     @@%  
 .@@&/,,#@@@    %@@       &@@@,    @@%    %@@          ,@@            /(*       /(#     ,@@     @@*      @@# 
   *%@@@&*      *%#        ,%#     #%/    *%#           %%            #############.    .%#     #%.      .%% 
                                                                  (@Tyl0us & @theDarracott)

 >>  [default]# help
Commands
========
workspace                Manages workspaces (create, list, load, delete)
live_capture             Initiates a valid wireless interface to collect wireless packets to be parsed (requires the interface name)
offline_capture          Begins parsing wireless packets using a pcap file-kismet .pcapdump work best (requires the full path)
offline_capture_list     Begins parsing wireless packets using a list of pcap file-kismet .pcapdump work best (requires the full path)
query                    Executes a query on the contents of the acitve workspace
help                     Displays this help menu
clear                    Clears the screen
show                     Shows the contents of a table, specific information across all tables or the available modules
inscope                  Add ESSID to scope. inscope [ESSID]
SSID_Info                Displays all information (i.e all BSSID, Channels and Encrpytion) related to the inscope SSIDS
use                      Use a SniffAir module
info                     Displays all variable information regarding the selected module
set                      Sets a variable in module
exploit                  Runs the loaded module
run                      Runs the loaded module
exit                     Exit SniffAir
 >>  [default]# 

Begin


First create or load a new or existing workspace using the command workspace create <workspace> or workspace load <workspace> command. To view all existing workspaces use the workspace list command and workspace delete <workspace> command to delete the desired workspace:

 >>  [default]# workspace
     Manages workspaces
 Command Option: workspaces [create|list|load|delete]
>>  [default]# workspace create demo
[+]  Workspace demo created

Load data into a desired workplace from a pcap file using the command offline_capture <the full path to the pcap file>. To load a series of pcap files use the command offline_capture_list <the full path to the file containing the list of pcap name> (this file should contain the full patches to each pcap file). Use the live_capture <interface name> command to capture live wireless traffic using a wireless interface.

>>  [demo]# offline_capture /root/sniffair/demo.pcapdump
[+] Importing /root/sniffair/demo.pcapdump
\
[+] Completed
[+] Cleaning Up Duplicates
[+] ESSIDs Observed

Show Command


The show command displays the contents of a table, specific information across all tables or the available modules, using the following syntax:

 >>  [demo]# show table AP
+------+-----------+-------------------+-------------------------------+--------+-------+-------+----------+--------+
|   ID | ESSID     | BSSID             | VENDOR                        |   CHAN |   PWR | ENC   | CIPHER   | AUTH   |
|------+-----------+-------------------+-------------------------------+--------+-------+-------+----------+--------|
|    1 | HoneyPot  | c4:6e:1f:##:##:## | TP-LINK TECHNOLOGIES CO. LTD. |      4 |   -17 | WPA2  | TKIP     | MGT    |
|    2 | Demo      | 80:2a:a8:##:##:## | Ubiquiti Networks Inc.        |     11 |   -19 | WPA2  | CCMP     | PSK    |
|    3 | Demo5ghz  | 82:2a:a8:##:##:## | Unknown                       |     36 |   -27 | WPA2  | CCMP     | PSK    |
|    4 | HoneyPot1 | c4:6e:1f:##:##:## | TP-LINK TECHNOLOGIES CO. LTD. |     36 |   -29 | WPA2  | TKIP     | PSK    |
|    5 | BELL456   | 44:e9:dd:##:##:## | Sagemcom Broadband SAS        |      6 |   -73 | WPA2  | CCMP     | PSK    |
+------+-----------+-------------------+-------------------------------+--------+-------+-------+----------+--------+
 >>  [demo]# show SSIDS
---------
HoneyPot
Demo
HoneyPot1
BELL456
Hidden
Demo5ghz
---------

The query command can be used to display a unique set of data based on the parememters specificed. The query command uses sql syntax.

Inscope


the inscope <SSID> command can be used to add a SSID to the inscope tables, loading all related data to the inscope_AP, inscope_proberequests and inscope_proberesponses tables. To view a summary of all inscope SSIDS run the SSID_Info command.

Modules


Modules can be used to analyze the data contained in the workspaces or perform offensive wireless attacks using the use <module name> command. For some modules additional variables may need to be set. They can be set using the set command set <variable name> <variable value>:

 >>  [demo]# show modules
Available Modules
=================
[+] Auto EAP - Automated Brute-Force Login Attack Against EAP Networks
[+] Auto PSK - Automated Brute-Force Passphrase Attack Against PSK Networks
[+] AP Hunter - Discover Access Point Within  a Certain Range Using a Specific Type of Encrpytion
[+] Captive Portal - Web Based Login Portal to Capture User Entered Credentials (Runs as an OPEN Network)
[+] Certificate Generator - Generates a Certificate Used by Evil Twin Attacks
[+] Exporter - Exports Data Stored in a Workspace to a CSV File
[+] Evil Twin - Creates a Fake Access Point, Clients Connect to Divulging MSCHAP Hashes or Cleartext Passwords
[+] Handshaker - Parses Database or .pcapdump Files Extracting the Pre-Shared Handshake for Password Guessing (Hashcat or JTR Format)
[+] Mac Changer - Changes The Mac Address of an Interface
[+] Probe Packet - Sends Out Deauth Packets Targeting SSID(s)
[+] Proof Packet - Parses Database or .pcapdump Files Extracting all Packets Related to the Inscope SSDIS
[+] Hidden SSID - Discovers the Names of HIDDEN SSIDS
[+] Suspicious AP - Looks for Access Points that: Is On Different Channel, use a Different Vendor or Encrpytion Type Then the Rest of The Network
[+] Wigle Search SSID - Queries wigle for SSID (i.e. Bob's wifi)
[+] Wigle Search MAC - Queries wigle for all observations of a single mac address
 >>  [demo]# 
 >>  [demo]# use Captive Portal
 >>  [demo][Captive Portal]# info
Globally Set Varibles
=====================
 Module: Captive Portal
 Interface: 
 SSID: 
 Channel: 
 Template: Cisco (More to be added soon)
 >>  [demo][Captive Portal]# set Interface wlan0
 >>  [demo][Captive Portal]# set SSID demo
 >>  [demo][Captive Portal]# set Channel 1
 >>  [demo][Captive Portal]# info
Globally Set Varibles
=====================
 Module: Captive Portal
 Interface: wlan0
 SSID: demo
 Channel: 1
 Template: Cisco (More to be added soon)
 >>  [demo][Captive Portal]# 

Once all varibles are set, then execute the exploit or run command to run the desired attack.

Export


To export all information stored in a workspace’s tables using the Exporter module and setting the desired path.

Acknowledgments


Sniffiar contains work from the following repoisoties:

sniffair's People

Contributors

jamesbcook avatar magnusstubman avatar rodrigobdz avatar tylous avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

sniffair's Issues

python pip logging install error in setup script and tabulate not found.....

i got a problem with the specific pip install logging command in the setup script... if i run pip install logging manually it throws me the following same error

Collecting logging (from -r requirements.txt (line 2)) Using cached https://files.pythonhosted.org/packages/93/4b/979db9e44be09f71e85c9c8cfc42f258adfb7d93ce01deed2788b2948919/logging-0.4.9.6.tar.gz Complete output from command python setup.py egg_info: running egg_info creating pip-egg-info/logging.egg-info writing pip-egg-info/logging.egg-info/PKG-INFO writing dependency_links to pip-egg-info/logging.egg-info/dependency_links.txt writing top-level names to pip-egg-info/logging.egg-info/top_level.txt writing manifest file 'pip-egg-info/logging.egg-info/SOURCES.txt' Traceback (most recent call last): File "<string>", line 1, in <module> File "/tmp/pip-build-d1761e8t/logging/setup.py", line 13, in <module> packages = ["logging"], File "/usr/lib/python3.6/distutils/core.py", line 148, in setup dist.run_commands() File "/usr/lib/python3.6/distutils/dist.py", line 955, in run_commands self.run_command(cmd) File "/usr/lib/python3.6/distutils/dist.py", line 974, in run_command cmd_obj.run() File "/usr/local/lib/python3.6/dist-packages/setuptools/command/egg_info.py", line 278, in run self.find_sources() File "/usr/local/lib/python3.6/dist-packages/setuptools/command/egg_info.py", line 293, in find_sources mm.run() File "/usr/local/lib/python3.6/dist-packages/setuptools/command/egg_info.py", line 524, in run self.add_defaults() File "/usr/local/lib/python3.6/dist-packages/setuptools/command/egg_info.py", line 560, in add_defaults sdist.add_defaults(self) File "/usr/local/lib/python3.6/dist-packages/setuptools/command/py36compat.py", line 34, in add_defaults self._add_defaults_python() File "/usr/local/lib/python3.6/dist-packages/setuptools/command/sdist.py", line 127, in _add_defaults_python build_py = self.get_finalized_command('build_py') File "/usr/lib/python3.6/distutils/cmd.py", line 298, in get_finalized_command cmd_obj = self.distribution.get_command_obj(command, create) File "/usr/lib/python3.6/distutils/dist.py", line 846, in get_command_obj klass = self.get_command_class(command) File "/usr/local/lib/python3.6/dist-packages/setuptools/dist.py", line 635, in get_command_class self.cmdclass[command] = cmdclass = ep.load() File "/usr/local/lib/python3.6/dist-packages/pkg_resources/__init__.py", line 2321, in load return self.resolve() File "/usr/local/lib/python3.6/dist-packages/pkg_resources/__init__.py", line 2327, in resolve module = __import__(self.module_name, fromlist=['__name__'], level=0) File "/usr/local/lib/python3.6/dist-packages/setuptools/command/build_py.py", line 15, in <module> from setuptools.lib2to3_ex import Mixin2to3 File "/usr/local/lib/python3.6/dist-packages/setuptools/lib2to3_ex.py", line 12, in <module> from lib2to3.refactor import RefactoringTool, get_fixers_from_package File "/usr/lib/python3.6/lib2to3/refactor.py", line 17, in <module> import logging File "/tmp/pip-build-d1761e8t/logging/logging/__init__.py", line 618 raise NotImplementedError, 'emit must be implemented '\ ^ SyntaxError: invalid syntax
python -V shows Python 2.7.15
so why is the script looking at the 3.6 env?

didnt expected airsniff to run before fixing this error but tried anyways and get also an

python ./SniffAir.py Traceback (most recent call last): File "./SniffAir.py", line 5, in <module> from Sniffer import * File "lib/Sniffer.py", line 3, in <module> from SniffAir import * File "/root/SniffAir/SniffAir.py", line 6, in <module> from Connect2DB import * File "lib/Connect2DB.py", line 8, in <module> from tabulate import tabulate ImportError: No module named tabulate
pip gives me an already statisfied if i installed it manually

Issues importing Kismet pcapdump files

When importing a pcapdump file captured using Kismet into offline_capture, I get the following error and SniffAir crashes:

[am_13thfloor]# offline_capture /root/Documents/Kismet_files/Kismet-20171017-12-33-03-1.pcapdump
|[*] Importing /root/Documents//Kismet_files/Kismet-20171017-12-33-03-1.pcapdump
|/---| /
[+] Completed
[+] Cleaning Up Duplicates
Traceback (most recent call last):
File "SniffAir.py", line 600, in
main_menu()
File "SniffAir.py", line 133, in main_menu
choice()
File "SniffAir.py", line 113, in choice
exec_menu(choice)
File "SniffAir.py", line 151, in exec_menu
menu_actionscmd
File "SniffAir.py", line 219, in Workspace
choice()
File "SniffAir.py", line 113, in choice
exec_menu(choice)
File "SniffAir.py", line 151, in exec_menu
menu_actionscmd
File "SniffAir.py", line 390, in Help
choice()
File "SniffAir.py", line 113, in choice
exec_menu(choice)
File "SniffAir.py", line 151, in exec_menu
menu_actionscmd
File "SniffAir.py", line 297, in Offline_Capture
d.clean_up()
File "lib/Queries.py", line 51, in clean_up
qr = dp.read_sql('select * from '+ tb +'', con)
File "/usr/local/lib/python2.7/dist-packages/pandas/io/sql.py", line 400, in read_sql
chunksize=chunksize)
File "/usr/local/lib/python2.7/dist-packages/pandas/io/sql.py", line 1453, in read_query
data = self._fetchall_as_list(cursor)
File "/usr/local/lib/python2.7/dist-packages/pandas/io/sql.py", line 1462, in _fetchall_as_list
result = cur.fetchall()
sqlite3.OperationalError: Could not decode to UTF-8 column 'ESSID' with text '?�?$?H`l'
root@beast:/opt/SniffAir#

When I review the am_13thfloor.db file, I find the following entries:
INSERT INTO accessPoints VALUES(NULL,'?�?$?Hl','18:64:72:58:ff:71','Aruba Networks','52','-64','WPA2','TKIP','PSK'); INSERT INTO accessPoints VALUES('?�?$?Hl','18:64:72:58:ff:71','Aruba Networks','52',-64,'WPA2','TKIP','PSK');

Testing with a different pcapdump file provides the same results, SniffAir crashes:

[default]# workspace create test
[+] Workspace test created
[test]# offline_capture /root/Documents//Kismet_files/Kismet-20171017-12-40-16-1.pcapdump
|[*] Importing /root/Documents/Kismet_files/Kismet-20171017-12-40-16-1.pcapdump

[+] Completed
[+] Cleaning Up Duplicates
Traceback (most recent call last):
File "SniffAir.py", line 687, in
main_menu()
File "SniffAir.py", line 137, in main_menu
choice()
File "SniffAir.py", line 117, in choice
exec_menu(choice)
File "SniffAir.py", line 155, in exec_menu
menu_actionscmd
File "SniffAir.py", line 225, in Workspace
choice()
File "SniffAir.py", line 117, in choice
exec_menu(choice)
File "SniffAir.py", line 155, in exec_menu
menu_actionscmd
File "SniffAir.py", line 304, in Offline_Capture
d.clean_up()
File "lib/Queries.py", line 51, in clean_up
qr = dp.read_sql('select * from '+ tb +'', con)
File "/usr/local/lib/python2.7/dist-packages/pandas/io/sql.py", line 400, in read_sql
chunksize=chunksize)
File "/usr/local/lib/python2.7/dist-packages/pandas/io/sql.py", line 1453, in read_query
data = self._fetchall_as_list(cursor)
File "/usr/local/lib/python2.7/dist-packages/pandas/io/sql.py", line 1462, in _fetchall_as_list
result = cur.fetchall()
sqlite3.OperationalError: Could not decode to UTF-8 column 'ESSID' with text 'm5'
root@beast:/opt/SniffAir#

Reviewing the following StackOverflow post and similar ones refer to "conn.text_factory = str"

https://stackoverflow.com/questions/22751363/sqlite3-operationalerror-could-not-decode-to-utf-8-column

However, I do not see this value defined in SniffAir.py

Recreate setup.py

The current setup.py is bad, including os.system with apt-get specifically and cloning a repository from bitbucket.

osx compatibility?

it looks like it is being written specifically for debian-based linux; any plans to port to osx pls?

Auto EAP Password not properly escaped

Testing the Auto EAP module with known good credentials it fails as the password contains a dollar sign ($):

[default][Auto EAP]# set Interface wlan0
[default][Auto EAP]# set SSID WiFi
[default][Auto EAP]# set Encryption WPA2
[default][Auto EAP]# set Key Management CCMP
[default][Auto EAP]# set Password 17GP4ttWYassA$!w
[default][Auto EAP]# exploit
Traceback (most recent call last):
File "./SniffAir.py", line 703, in
main_menu()
File "./SniffAir.py", line 138, in main_menu
choice()
File "./SniffAir.py", line 118, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 519, in use
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 474, in info
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 597, in set
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 474, in info
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 597, in set
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 597, in set
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 597, in set
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 597, in set
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 597, in set
choice()
File "./SniffAir.py", line 128, in choice
exec_menu(choice)
File "./SniffAir.py", line 156, in exec_menu
menu_actionscmd
File "./SniffAir.py", line 639, in exploit
args = ' -s "'+ list1['SSID']+'" -K '+ list1['Key_Management'] +' -E '+list1['Encryption'] +' -U '+list1['Username_File']+' -p '+ list1['Password']+' -i '+ list1['Interface']+' -W '+workspace+''
TypeError: cannot concatenate 'str' and 'list' objects

nmcli error

hi trying to get sniffair to work in kali nethunter, but i'm getting error ...

[cp][Captive Portal]# run
Error: Could not create NMClient object: Could not connect: No such file or directory.
Error: Could not create NMClient object: Could not connect: No such file or directory.
Setting up Hostapd configuration
Setting up DNS
Launching web server

Add compatibility to ParrotOS

Hello,

When I'm going to install SniffAir it tells me that the distribution is unknown...

The system is Parrot OS 4.3

Could you add compatibility with it ?

Thank you very much in advance.

Python 2 is EOL

If this project wants to have some future, it should be ported to Python 3.
Thanks, anyway

Error generating while running SniffAir

python SniffAir.py

Traceback (most recent call last):
File "SniffAir.py", line 12, in
from Sniffer import *
File "lib/Sniffer.py", line 3, in
from SniffAir import *
File "/home/seth/Desktop/SniffAir/SniffAir.py", line 13, in
from Connect2DB import *
File "lib/Connect2DB.py", line 9, in
from tabulate import tabulate
ImportError: No module named tabulate

can you please suggest how to solve this issue

Hidden SSID Module

The wiki states to run a module, you enter "use" and the module name. In this case, that means you'd enter "use Run Hidden SSID." That doesn't work. If I enter "use Hidden SSID," then it works.

Connected Device Not Opening Captive Portal

Hi , upon launching the tool, i connected the device to the wifi .. it launches the browser, but the captive portal page is not displaying on the device. How do i solve this ?

=====================
Module: Captive Portal
Interface: wlan1 The Interface to Use
SSID: test The SSID to Masquerade As
Channel: 4 The Channel for the AP to be on
Template: Cisco (More to be added soon)

[captive][Captive Portal]# run
Setting up Hostapd configuration
Setting up DNS
Launching web server

10.20.0.201 - - [30/Oct/2019 00:47:43] "GET /generate_204 HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:47:43] "GET /generate_204 HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:47:43] "GET /generate_204 HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:47:43] "GET /generate_204 HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:47:44] "GET /generate_204 HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:48:13] "GET /generate_204 HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:48:15] "GET /connect HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:48:15] "GET /connect HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:48:15] "GET /connect HTTP/1.1" 200 -
./login.html
10.20.0.201 - - [30/Oct/2019 00:48:15] "GET /connect HTTP/1.1" 200 -

Freeradius.com domain expired

Tried to install SniffAir this afternoon, but got the following while running the setup.sh script:

--2018-11-15 14:25:14-- ftp://ftp.freeradius.org/pub/radius/old/freeradius-server-2.1.12.tar.bz2
=> ‘freeradius-server-2.1.12.tar.bz2’
Resolving ftp.freeradius.org (ftp.freeradius.org)... 62.210.29.29
Connecting to ftp.freeradius.org (ftp.freeradius.org)|62.210.29.29|:21... failed: Connection timed out.
Retrying.

Turns out the domain expired:
image

I'm currently using a mirror located here: https://ftp.yz.yamagata-u.ac.jp/pub/network/freeradius/old/freeradius-server-2.1.12.tar.bz2, but that comes with another whole other host of potential problems

Unable to do live capture. Stuck at "Stopping WPA Supplicant Service"

I'm having issues with a live_capture. It used to work, and I'm not sure what the regression is
Similar to this comment in a closed issue:
#9 (comment)

[Project][]# live_capture wlan0
[+] Stopping Network-manager Service....
[+] Stopping WPA_Supplicant Service....

It just hangs there.

I know I can get my card isn't monitor mode, as sudo airmon-ng start wlan0 works (and I can capture traffic in kismet),

Any suggestions on getting you more information to isolate the problem?

SyntaxError

root@kali:~/SniffAir# sudo python SniffAir.py
File "SniffAir.py", line 163
print colors.RD + "Invalid selection, please try again.\n" + colors.NRM
^
SyntaxError: Missing parentheses in call to 'print'. Did you mean print(colors.RD + "Invalid selection, please try again.\n" + colors.NRM)?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.