Metasploit mailing list archives

autopwn Error


From: Beenu Arora <beenudel1986 () gmail com>
Date: Sat, 21 Nov 2009 10:03:54 +0530

I am getting a strange error when i use data card and use the metasploit
autopwn
Is there any way i can configure metasploit or something to use different
network adapter.

Error is appended below.

*Starting Nmap 5.00 ( http://nmap.org ) at 2009-11-21 10:00 India Standard
Time
WARNING: Using raw sockets because ppp0 is not an ethernet device. This
probably won't work on Windows.

pcap_open_live(ppp0, 100, 0, 2) FAILED. Reported error: Error opening
adapter: The system cannot find the device specified. (20).  Will wait 5
seconds then retry.
pcap_open_live(ppp0, 100, 0, 2) FAILED. Reported error: Error opening
adapter: The system cannot find the device specified. (20).  Will wait 25
seconds then retry.
Call to pcap_open_live(ppp0, 100, 0, 2) failed three times. Reported error:
Error opening adapter: The system cannot find the device specified. (20)
There are several possible reasons for this, depending on your operating
system:
LINUX: If you are getting Socket type not supported, try modprobe af_packet
or recompile your kernel with SOCK_PACKET enabled.
*BSD:  If you are getting device not configured, you need to recompile your
kernel with Berkeley Packet Filter support.  If you are getting No such file
or directory, try creating the device (eg cd /dev; MAKEDEV <device>; or use
mknod).
*WINDOWS:  Nmap only supports ethernet interfaces on Windows for most
operations because Microsoft disabled raw sockets as of Windows XP SP2.
Depending on the reason for this error, it is possible that the
--unprivileged command-line argument will help.
SOLARIS:  If you are trying to scan localhost or the address of an interface
and are getting '/dev/lo0: No such file or directory' or 'lo0: No DLPI
device found', complain to Sun.  I don't think Solaris can support advanced
localhost scans.  You can probably use "-PN -sT localhost" though.*

-- 
Beenu Arora
M.C.S.E. , C|EH
+91-9911254288
www.BeenuArora.com
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: