Ninja Monkey Posted May 25, 2010 Share Posted May 25, 2010 Trying to get the python script working on on my Backtrack USB boot and I get the same error and no reports ERROR ! WARNING: No route found for IPv6 destination :: (no default route?) Can anyone help, as it would be nice to see when people try accessing my router or deauth me. Quote Link to comment Share on other sites More sharing options...
ParMan Posted May 25, 2010 Share Posted May 25, 2010 Trying to get the python script working on on my Backtrack USB boot and I get the same error and no reports ERROR ! WARNING: No route found for IPv6 destination :: (no default route?) Can anyone help, as it would be nice to see when people try accessing my router or deauth me. May you should show script your trying to get working. Quote Link to comment Share on other sites More sharing options...
Ninja Monkey Posted May 25, 2010 Author Share Posted May 25, 2010 May you should show script your trying to get working. #!/usr/bin/env python ###################################################### # authWatch.py v. 0.1 (Quick, Dirty and Loud) - by TinMan # Place card in monitor mode and set the channel. # If you want channel hopping, run airodump-ng in # another terminal. Will add channel hopping # in the next version. ###################################################### # # Usage: python authWatch.py # import sys from scapy.all import * interface = sys.argv[1] def sniffReq(p): if p.haslayer(Dot11Deauth): # Look for a deauth packet and print the AP BSSID, Client BSSID and the reason for the deauth. print p.sprintf("Deauth Found from AP [%Dot11.addr2%] Client [%Dot11.addr1%], Reason [%Dot11Deauth.reason%]") # Look for an association request packet and print the Station BSSID, Client BSSID, AP info. if p.haslayer(Dot11AssoReq): print p.sprintf("Association request from Station [%Dot11.addr1%], Client [%Dot11.addr2%], AP [%Dot11Elt.info%]") # Look for an authentication packet and print the Client and AP BSSID if p.haslayer(Dot11Auth): print p.sprintf("Authentication Request from [%Dot11.addr1%] to AP [%Dot11.addr2%]") print p.sprintf("------------------------------------------------------------------------------------------") sniff(iface=interface,prn=sniffReq) Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.