0x0be / mitm

A simple yet effective python3 script to perform DNS spoofing via ARP poisoning
33 stars 9 forks source link

Error ( Please help) #2

Open amster69 opened 4 years ago

amster69 commented 4 years ago

root@kali:~/Desktop/tools/MITM/mitm# python3 mitm.py

::::    :::: ::::::::::::::::::::::::::    :::: 
+:+:+: :+:+:+    :+:        :+:    +:+:+: :+:+:+
+:+ +:+:+ +:+    +:+        +:+    +:+ +:+:+ +:+
+#+  +:+  +#+    +#+        +#+    +#+  +:+  +#+
+#+       +#+    +#+        +#+    +#+       +#+
#+#       #+#    #+#        #+#    #+#       #+#
###       ##############    ###    ###       ###

    Th3Hurrican3

[*] Available network interfaces:

0) lo
1) eth0
2) tun0
3) wlan0

mitm:interface> 2

[*] Available hosts:

Traceback (most recent call last): File "mitm.py", line 43, in discover.discover(net.get_attacker_ip(), net.get_net_mask()) File "/root/Desktop/tools/MITM/mitm/netdiscover.py", line 22, in discover nm = nmap.PortScanner() AttributeError: module 'nmap' has no attribute 'PortScanner' root@kali:~/Desktop/tools/MITM/mitm#

Gurkinator1 commented 3 years ago

I have the same issue, I found that it happens because of a wrong import (python-nmap3 instead of nmap) inside the netdiscover.py

Gurkinator1 commented 3 years ago

I tried fixing it using https://pypi.org/project/python3-nmap/