when i key in /pentest/passwords/crunch/./crunch 10 15 1234567890qwertyuiopasdf ghjklzxcvbnm -u | pyrit -i- -r 2C-AB-25-AE-ED-2C_handshake.cap -e fshoo attack_p assthrough WARNING: IPv6 support disabled in Python. Cannot load scapy IPv6 layers. Parsing file '2C-AB-25-AE-ED-2C_handshake.cap' (1/1)... Traceback (most recent call last): File "/usr/local/bin/pyrit", line 6, in <module> pyrit_cli.Pyrit_CLI().initFromArgv() File "/usr/local/lib/python2.7/site-packages/pyrit_cli.py", line 115, in initFromArgv File "/usr/local/lib/python2.7/site-packages/pyrit_cli.py", line 163, in new_f File "/usr/local/lib/python2.7/site-packages/pyrit_cli.py", line 912, in attack_passthrough File "/usr/local/lib/python2.7/site-packages/pyrit_cli.py", line 179, in _getParser File "/usr/local/lib/python2.7/site-packages/cpyrit/pckttools.py", line 600, in parse_pcapdevice File "/usr/local/lib/python2.7/site-packages/cpyrit/pckttools.py", line 500, in next File "/usr/local/lib/python2.7/site-packages/cpyrit/pckttools.py", line 488, in read IOError: libpcap-error while reading: truncated dump file; tried to read 16 header bytes, only got 9 any help? plsssssssssssss
Your answer is in your Question what are you using to generate dump ? Use wireshark or striplive Code: Select All pyrit -r handshake.cap -o fixedcap.cap stripLive
bro i just use miniwep to get handshake and i key in the pentest/passwords/................... then it get this error i doesnt do anything else. --- Double Post Merged, 14 Jun 2013 --- i really doesnt know how to make wifishark/striplive work. --- Double Post Merged, 14 Jun 2013 --- can teach me step by step because im quite newbie --- Double Post Merged, 14 Jun 2013 --- haha i fixed myself d.. thanks meknb admin pls close this thread.. thanks admin