Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The provided interface "wlan1" is invalid! #24

Open
yesimxev opened this issue Mar 1, 2020 · 0 comments
Open

The provided interface "wlan1" is invalid! #24

yesimxev opened this issue Mar 1, 2020 · 0 comments

Comments

@yesimxev
Copy link

yesimxev commented Mar 1, 2020

Looks like something is wrong in the wlan1 check, whereas wlan1 has the modes. I can't force it to use wlan1 as AP, it wants wlan0

root@kali:~# wifiphisher -i wlan1 -eI wlan1 -aI wlan1
[*] Starting Wifiphisher 1.4GIT ( https://wifiphisher.org ) at 2020-03-01 11:43
[+] Timezone detected. Setting channel range to 1-13
ERROR:root:The following error has occurred:
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/wifiphisher-1.4-py2.7.egg/wifiphisher/pywifiphisher.py", line 426, in start
    args.apinterface, "AP"):
  File "/usr/local/lib/python2.7/dist-packages/wifiphisher-1.4-py2.7.egg/wifiphisher/common/interfaces.py", line 438, in is_interface_valid
    raise InvalidInterfaceError(interface_name)
InvalidInterfaceError: The provided interface "wlan1" is invalid![!] The provided interface "wlan1" is invalid!
[+] Show your support!
[+] Follow us: https://twitter.com/wifiphisher
[+] Like us: https://www.facebook.com/Wifiphisher
[+] Captured credentials:
[!] Closing
root@kali:~# wifiphisher -i wlan1
[*] Starting Wifiphisher 1.4GIT ( https://wifiphisher.org ) at 2020-03-01 11:49
[+] Timezone detected. Setting channel range to 1-13
[+] Selecting wfphshr-wlan0 interface for the deauthentication attack
[+] Selecting wlan0 interface for creating the rogue Access Point[+] Changing wlan0 MAC addr (BSSID) to 00:00:00:39:c2:74
[!] The MAC address could not be set. (Tried 00:00:00:db:2d:9e)
[+] Sending SIGKILL to wpa_supplicant
[+] Sending SIGKILL to avahi-daemon
[*] Cleared leases, started DHCP, set up iptables
[+] Show your support!
[+] Follow us: https://twitter.com/wifiphisher
[+] Like us: https://www.facebook.com/Wifiphisher
[+] Captured credentials:
[!] Closing
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant