Closed Blisteur closed 6 years ago
Hello,
Can you please specify what exactly is not working?
Regards
Thank you for your answer, the device that I try to disconnect does not disconnect
it is installed on a dedicated laptop
Le ven. 22 juin 2018 à 13:41, NickWho notifications@github.com a écrit :
@Blisteur https://github.com/Blisteur Hi, Actually it does still work. Are you using a VM for using KickThemOut.py or a main Computer with Linux installed ? Because earlier i had the Problem too, that i couldn't kick people out of my Network. But then i just find out, that i could fix the Issue by installing Linux on my Notebook.
If I understand it correctly you want to disconnect device which is running this script. Is that right?
no I try to disconnect my phone from the laptop
And you can find your phone in the list of connected devices?
Yes I see it but when I try to disconnect it it turns in the void
Hi there @Blisteur. This issue seems pretty vague to me. Could you please clarify why you have come to the conclusion that KickThemOut is not working? In an issue, you are meant to give us something that we can work with, not just draw an unclear conclusion. Thanks.
Hello, I came to this conclusion because after testing this software it can not disconnect a device from the network, it is blocked at the time of the attack and runs in a vacuum. Thank you for your reply. sorry for my poor English.
Could you please elaborate what you mean by "it is blocked at the time of the attack" and "runs in a vacuum"? Thanks again.
the attack is blocked at "Spoofing started ... "and does not change even after 20 minutes.
Well, that is precisely what should be happening. Once the attack begins, the text Spoofing started...
indicates that the ARP spoofing packets are now being sent out to the victim (meaning that if you open up Wireshark or any other packet monitoring software, you should be able to see the packets being broadcasted). When you select ^C
, then the attack stops and the target is 're-ARPed'. I still cannot see why you believe that KickThemOut is "blocked at the time of the attack" and "runs in a vacuum". Thanks.
I think it is stuck at the time of the attack because watching with wireshark I do not see anything and the phone does not disconnect, "runs in the void" is a French expression meaning that it charges indefinitely. sorry for my approximate English.
Could you please share a screenshot or screen-recording of Wireshark after the attack has began? No worries for the language.
there is a problem, I do not see any device.
Can you please share a video showing Wireshark packets once KickTheOut has started running? These two videos don't show the traffic while the attack is actually in progress. Thanks again.
I just succeeded, I just restart my router, by chance you know why I receive posts in wireshark because I had never had before trying KickThemOut
and thank you again.
Glad it worked!
me also getting this issue . please somebody help how it can be fixed
I just succeeded, I just restart my router, by chance you know why I receive posts in wireshark because I had never had before trying KickThemOut
and thank you again.
how did you fixed this issue ?i am facing this same issue
Hello. does the software still work? because at me no. Thank you for your reply