While using your script, our group had an issue with it saying it couldn't put us in monitor mode, even though it made the monX device just fine.
We just modified the script to point to the proper device manually.... sorry I don't have anymore information on this at the moment, but I will do more checking on it Friday night. We were using BT4f updated, Pentoo, and FC... all failed until the script was modified. My assumption before researching is we had 2 wifi cards installed and the wifi_int vairable is getting confused with the 2 wifiX's. Just throwing this out there until more can be done.. PS - THANKS FOR THE SCRIPT! We are looking to make this allow for proxying to push the picked up systems to the Internet through the second wifi card (2nd wifi network pwned by bob?).. making a MITM. ~bytesabit On Sat, Jul 31, 2010 at 3:55 PM, Carlos Perez <[email protected] > wrote: > Hi Guys > > I wrote this small Ruby script for launching Karmetasploit type attacks in > BT4, I need to make sure it is working A OK befor I send it to PureHate for > replaciong the kmsapng tool I contributed for the project. Any bug reports > are welcomed. > > Cheers, > Carlos > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
