k4m4 / kickthemout

💤 Kick devices off your network by performing an ARP Spoof attack.
https://nikolaskama.me/kickthemoutproject
MIT License
2.49k stars 438 forks source link

Not spoofing targetted IPs #420

Open LahaLuhem opened 4 years ago

LahaLuhem commented 4 years ago

Checklist for submitting an issue to KickThemOut:

- **OS name & version**: Windows 10 - **Python version**:
- **Description**: Hi, I tried spoofing on all the devices connected to the network (including my phone), and despite the message, "spoofing has started", I could still access websites on my phone, without any drops. Meaning it's not working as it's intended to. Any help will be appreciated.
LahaLuhem commented 4 years ago

the description is not being visible. So please read from the source file.

k4m4 commented 4 years ago

Hi there @LahaLuhem. Are you trying to run KickThemOut on a native Windows machine or on a VM that's running within Windows? Thanks.

LahaLuhem commented 4 years ago

A VM running inside of Windows, specifically, Oracle VirtualBox

On Wed, 27 Nov, 2019, 20:42 Nikolaos Kamarinakis, notifications@github.com wrote:

Hi there @LahaLuhem https://github.com/LahaLuhem. Are you trying to run KickThemOut on a native Windows machine or on a VM that's running within Windows? Thanks.

— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/k4m4/kickthemout/issues/420?email_source=notifications&email_token=ALN3VC367C5LLL7E2LUR7ETQV3ETVA5CNFSM4JINP5FKYY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEFKSBJY#issuecomment-559227047, or unsubscribe https://github.com/notifications/unsubscribe-auth/ALN3VC4KYPUWUIBJI2DVXXDQV3ETVANCNFSM4JINP5FA .