wifiphisher / roguehostapd

Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

The provided interface "wlan1" is invalid!

yesimxev opened this issue · comments

Looks like something is wrong in the wlan1 check, whereas wlan1 has the modes. I can't force it to use wlan1 as AP, it wants wlan0

root@kali:~# wifiphisher -i wlan1 -eI wlan1 -aI wlan1
[*] Starting Wifiphisher 1.4GIT ( https://wifiphisher.org ) at 2020-03-01 11:43
[+] Timezone detected. Setting channel range to 1-13
ERROR:root:The following error has occurred:
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/wifiphisher-1.4-py2.7.egg/wifiphisher/pywifiphisher.py", line 426, in start
    args.apinterface, "AP"):
  File "/usr/local/lib/python2.7/dist-packages/wifiphisher-1.4-py2.7.egg/wifiphisher/common/interfaces.py", line 438, in is_interface_valid
    raise InvalidInterfaceError(interface_name)
InvalidInterfaceError: The provided interface "wlan1" is invalid![!] The provided interface "wlan1" is invalid!
[+] Show your support!
[+] Follow us: https://twitter.com/wifiphisher
[+] Like us: https://www.facebook.com/Wifiphisher
[+] Captured credentials:
[!] Closing
root@kali:~# wifiphisher -i wlan1
[*] Starting Wifiphisher 1.4GIT ( https://wifiphisher.org ) at 2020-03-01 11:49
[+] Timezone detected. Setting channel range to 1-13
[+] Selecting wfphshr-wlan0 interface for the deauthentication attack
[+] Selecting wlan0 interface for creating the rogue Access Point[+] Changing wlan0 MAC addr (BSSID) to 00:00:00:39:c2:74
[!] The MAC address could not be set. (Tried 00:00:00:db:2d:9e)
[+] Sending SIGKILL to wpa_supplicant
[+] Sending SIGKILL to avahi-daemon
[*] Cleared leases, started DHCP, set up iptables
[+] Show your support!
[+] Follow us: https://twitter.com/wifiphisher
[+] Like us: https://www.facebook.com/Wifiphisher
[+] Captured credentials:
[!] Closing