SpiderLabs / Responder

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
GNU General Public License v3.0
4.41k stars 1.66k forks source link

Errors - Kali linux - -A param #120

Open M3noetius opened 7 years ago

M3noetius commented 7 years ago

sudo ./Responder.py -I wlan0 -A

[i] Responder is in analyze mode. No NBT-NS, LLMNR, MDNS requests will be poisoned. Traceback (most recent call last): File "./Responder.py", line 263, in <module> main() File "./Responder.py", line 182, in main from poisoners.LLMNR import LLMNR File "filepath/Responder-master/poisoners/LLMNR.py", line 45, in <module> IsICMPRedirectPlausible(settings.Config.Bind_To) File "filepath/Responder-master/poisoners/LLMNR.py", line 39, in IsICMPRedirectPlausible if x != "127.0.0.1" and IsOnTheSameSubnet(x,IP) is False: File "filepath/Responder-master/utils.py", line 50, in IsOnTheSameSubnet ipaddr = int(''.join([ '%02x' % int(x) for x in ip.split('.') ]), 16) ValueError: invalid literal for int() with base 10: 'fe80::1%wlan0'

sumaoqing123 commented 7 years ago

temporarily, you can edit /etc/resolv.conf, and delete the line starts with 'fe80'

kawaxi commented 6 years ago

thanks for the information @sumaoqing123 , still useful