wsf > use http_sniffer
wsf > http_sniffer > execute
Traceback (most recent call last):
File "/usr/local/bin/websploit", line 11, in
load_entry_point('websploit==4.0.4', 'console_scripts', 'websploit')()
File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/websploit.py", line 74, in start_wsf
Main().cmdloop()
File "/usr/lib/python3.8/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.8/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/websploit.py", line 35, in do_use
module.cmdloop()
File "/usr/lib/python3.8/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.8/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/modules/http_sniffer.py", line 25, in do_execute
sniff(filter="port 80", prn=self.packet_handler, iface=self.parameters['iface'], store=False)
File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/sendrecv.py", line 972, in sniff
sniffer._run(*args, **kwargs)
File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/sendrecv.py", line 841, in _run
sniff_sockets[L2socket(type=ETH_P_ALL, iface=iface,
File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/arch/linux.py", line 467, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type)) # noqa: E501
File "/usr/lib/python3.8/socket.py", line 231, in init
_socket.socket.init(self, family, type, proto, fileno)
OSError: [Errno 97] Address family not supported by protocol
wsf > use http_sniffer wsf > http_sniffer > execute Traceback (most recent call last): File "/usr/local/bin/websploit", line 11, in
load_entry_point('websploit==4.0.4', 'console_scripts', 'websploit')()
File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/websploit.py", line 74, in start_wsf
Main().cmdloop()
File "/usr/lib/python3.8/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.8/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/websploit.py", line 35, in do_use
module.cmdloop()
File "/usr/lib/python3.8/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.8/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/modules/http_sniffer.py", line 25, in do_execute
sniff(filter="port 80", prn=self.packet_handler, iface=self.parameters['iface'], store=False)
File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/sendrecv.py", line 972, in sniff
sniffer._run(*args, **kwargs)
File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/sendrecv.py", line 841, in _run
sniff_sockets[L2socket(type=ETH_P_ALL, iface=iface,
File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/arch/linux.py", line 467, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type)) # noqa: E501
File "/usr/lib/python3.8/socket.py", line 231, in init
_socket.socket.init(self, family, type, proto, fileno)
OSError: [Errno 97] Address family not supported by protocol