NikolaiT / zardaxt

Passive TCP/IP Fingerprinting Tool. Run this on your server and find out what Operating Systems your clients are *really* using.
Other
292 stars 33 forks source link

You don't have permission to capture on that device #7

Closed workingxx92 closed 2 years ago

workingxx92 commented 2 years ago

(zardaxt) bash-3.2$ python tcp_fingerprint.py -i eth0 --classify WARNING (): Couldn't load netifaces, some utils won't work Loaded 3203 fingerprints from the database listening on interface eth0 eth0: You don't have permission to capture on that device ((cannot open BPF device) /dev/bpf0: Permission denied) (zardaxt) bash-3.2$

Os Version: macos Big sur

NikolaiT commented 2 years ago

sudo python tcp_fingerprint.py -i eth0 --classify

Rule of thumb: If it does not work, always put sudo in front of it...just kidding

workingxx92 commented 2 years ago

@NikolaiT I get an error when put sudo Macbooks-MacBook-Pro:zardaxt macbookpro$ sudo python tcp_fingerprint.py -i eth0 --classify Password: File "tcp_fingerprint.py", line 320 print(e, end='\n', flush=True) ^ SyntaxError: invalid syntax Macbooks-MacBook-Pro:zardaxt macbookpro$ sudo python tcp_fingerprint.py -i eth0 --classify File "tcp_fingerprint.py", line 320 print(e, end='\n', flush=True) ^ SyntaxError: invalid syntax