wsf > use arp_spoof
wsf > arp_spoof > set target 79.174.35.109
target (there was my target)
wsf > arp_spoof > execute
Traceback (most recent call last):
File "/usr/bin/websploit", line 33, in
sys.exit(load_entry_point('websploit==4.0.4', 'console_scripts', 'websploit')())
File "/usr/lib/python3/dist-packages/websploit/websploit.py", line 74, in start_wsf
Main().cmdloop()
File "/usr/lib/python3.10/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.10/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/lib/python3/dist-packages/websploit/websploit.py", line 35, in do_use
module.cmdloop()
File "/usr/lib/python3.10/cmd.py", line 138, in cmdloop
stop = self.onecmd(line)
File "/usr/lib/python3.10/cmd.py", line 217, in onecmd
return func(arg)
File "/usr/lib/python3/dist-packages/websploit/modules/arp_spoof.py", line 24, in do_execute
self._spoof(target=self.parameters['target'], getway=self.parameters['gateway'])
File "/usr/lib/python3/dist-packages/websploit/modules/arp_spoof.py", line 37, in _spoof
target_mac = get_mac(ip=target)
File "/usr/lib/python3/dist-packages/websploit/core/utils/tools.py", line 7, in get_mac
ans, _ = srp(Ether(dst='ff:ff:ff:ff:ff:ff')/ARP(pdst=ip), timeout=3, verbose=0)
File "/usr/lib/python3/dist-packages/scapy/sendrecv.py", line 552, in srp
s = conf.L2socket(promisc=promisc, iface=iface,
File "/usr/lib/python3/dist-packages/scapy/arch/linux.py", line 410, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type)) # noqa: E501
File "/usr/lib/python3.10/socket.py", line 232, in init
_socket.socket.init(self, family, type, proto, fileno)
OSError: [Errno 97] Address family not supported by protocol