The title is pretty explicit. The program crash when performing DHCP rogue server at the moment when the DHCP discover packet is received on the hacking maching.
Attack settings (DHCP rogue server)
Server IP : 192.168.1.3
Start IP : 192.168.1.4
End IP : 192.168.1.250
Lease time : 30
Renew time : 30
Subnet mask : 255.255.255.0
Router : 192.168.1.3
DNS Server : 192.168.1.3
Domain : hack.com
Generated logs
# yersinia v0.8.2 started in evil-pc on Mon Nov 7 01:23:11 2022
Network Interface wlan0
wlan0 iflinkname EN10MB
wlan0 iflinkdesc Ethernet
wlan0 MAC = AAAA.BBBB.CCCC
Network Interface lo
lo iflinkname EN10MB
lo iflinkdesc Ethernet
lo MAC = 0000.0000.0000
Network Interface bluetooth0
Network Interface bluetooth-monitor
pcap_open_live failed: bluetooth-monito: No such device exists (No such device exists)
Network Interface nflog
Network Interface nfqueue
Network Interface dbus-system
Network Interface dbus-session
pcap_open_live failed: dbus-session: Failed to get session bus: /usr/bin/dbus-launch terminated abnormally without any error message
th_uptime thread = 5F455640
gtk_gui_th = 5EC54640
attack_launch: 5EC54640 Attack thread 5DFFF640 is born!!
Error in dhcp_get_printable: len is 0 and type is 80
Issue
The title is pretty explicit. The program crash when performing DHCP rogue server at the moment when the DHCP discover packet is received on the hacking maching.
Attack settings (DHCP rogue server)
Generated logs
DHCP Discover frame (from Wireshark)
It seems that there is a problem with the following line : https://github.com/tomac/yersinia/blob/b56334e3ae45c9ff27969f57bd1d81cfe21bc717/src/dhcp.c#L1382
Best regards.