What steps will reproduce the problem?
1.pyrite batch
2.once completed run attack_db
3.
What is the expected output? What do you see instead?
Well I suppose I'm going to find the cracked WPA2 password instead i get this
error message.
"
Connecting to storage at 'file://'... connected.
Parsing file 'hs/NETGEAR68_E0-46-9A-86-B8-41.cap' (1/1)...
Traceback (most recent call last):
File "/usr/bin/pyrit", line 6, in <module>
pyrit_cli.Pyrit_CLI().initFromArgv()
File "/usr/lib/pymodules/python2.7/pyrit_cli.py", line 115, in initFromArgv
func(self, **options)
File "/usr/lib/pymodules/python2.7/pyrit_cli.py", line 163, in new_f
f(*args, **kwds)
File "/usr/lib/pymodules/python2.7/pyrit_cli.py", line 1041, in attack_db
ap = self._fuzzyGetAP(self._getParser(capturefile), bssid, essid)
File "/usr/lib/pymodules/python2.7/pyrit_cli.py", line 179, in _getParser
parser.parse_pcapdevice(dev)
File "/usr/lib/pymodules/python2.7/cpyrit/pckttools.py", line 600, in parse_pcapdevice
for pckt in reader:
File "/usr/lib/pymodules/python2.7/cpyrit/pckttools.py", line 500, in next
pckt = self.read()
File "/usr/lib/pymodules/python2.7/cpyrit/pckttools.py", line 488, in read
r = _cpyrit_cpu.PcapDevice.read(self)
IOError: libpcap-error while reading: truncated dump file; tried to read 16
header bytes, only got 4
"
What version of the product are you using? On what operating system?
I'm using pyrite 0.4.0
Running Kali Linux
Please provide any additional information below.
Lol I have no idea how to fix this.
Original issue reported on code.google.com by FCarlto...@gmail.com on 20 Jan 2015 at 1:25
Original issue reported on code.google.com by
FCarlto...@gmail.com
on 20 Jan 2015 at 1:25