f4rih / websploit

Websploit is a high level MITM framework
MIT License
1.13k stars 291 forks source link

OSError: [Errno 97] Address family not supported by protocol #44

Open ghost opened 4 years ago

ghost commented 4 years ago

wsf > use http_sniffer wsf > http_sniffer > execute Traceback (most recent call last): File "/usr/local/bin/websploit", line 11, in load_entry_point('websploit==4.0.4', 'console_scripts', 'websploit')() File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/websploit.py", line 74, in start_wsf Main().cmdloop() File "/usr/lib/python3.8/cmd.py", line 138, in cmdloop stop = self.onecmd(line) File "/usr/lib/python3.8/cmd.py", line 217, in onecmd return func(arg) File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/websploit.py", line 35, in do_use module.cmdloop() File "/usr/lib/python3.8/cmd.py", line 138, in cmdloop stop = self.onecmd(line) File "/usr/lib/python3.8/cmd.py", line 217, in onecmd return func(arg) File "/usr/local/lib/python3.8/dist-packages/websploit-4.0.4-py3.8.egg/websploit/modules/http_sniffer.py", line 25, in do_execute sniff(filter="port 80", prn=self.packet_handler, iface=self.parameters['iface'], store=False) File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/sendrecv.py", line 972, in sniff sniffer._run(*args, **kwargs) File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/sendrecv.py", line 841, in _run sniff_sockets[L2socket(type=ETH_P_ALL, iface=iface, File "/usr/local/lib/python3.8/dist-packages/scapy-2.4.3-py3.8.egg/scapy/arch/linux.py", line 467, in init self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type)) # noqa: E501 File "/usr/lib/python3.8/socket.py", line 231, in init _socket.socket.init(self, family, type, proto, fileno) OSError: [Errno 97] Address family not supported by protocol