Open ncc-brian opened 2 years ago
im having the same issue and the workarounds above do not work. any update on this issue?
just ran into the same issue
Same issue here. Trying out the second workaround option.
Adding that I just saw this as well. Attempting ncc-brian's workaround.
The DHCP poisoner Fails to handle some packets with the following error:
IP address is selected by regex at https://github.com/lgandx/Responder/blob/5cf69228cf5ce4c0433904ee1d05955e8fd6f618/poisoners/DHCP.py#L243 and should look something like this: b'\xac\x165L'
This then lands at https://github.com/lgandx/Responder/blob/5cf69228cf5ce4c0433904ee1d05955e8fd6f618/poisoners/DHCP.py#L268 where it is translated to a human-readable IP (this is where Python3 errors out).
A bit of digging shows that for the packets that fail, the value for IP returned from FindIP is a byte short. When this value is then fed into inet_ntoa it errors.
Example (this is the IP that was erroring):
For the moment I'm working around it as follows:
It also appears to work if the regex adds a dot before the star:
I won't say either fix is a good idea, just that it seems to be working for me. I suggest further investigation by people who know more than I do about this.
Thanks!