BackTrack5r3中执行nmap时提示invalid bpf filter

Hello,


I want to do a TCP idle scan with metasploit&nmap

But I keep having a problem with Metasploit.Here is what I do and the error I get.


msf>use auxiliary/scanner/ip/ipidseq


msfauxiliary(ipidseq)>set RHOSTS 192.168.1.0/24

RHOSTS=>192.168.1.0/24

msfauxiliary(ipidseq)>set THREADS 50

THREADS=>50

msfauxiliary(ipidseq)>run

usbmon1:ERRORwhilegettinginterfaceflags:Nosuchdevice


[-]Auxiliaryfailed:RuntimeErrorinvalidbpffilter

[-]Callstack:

[-]/opt/metasploit/msf3/lib/msf/core/exploit/capture.rb:113:in`setfilter'

[-]/opt/metasploit/msf3/lib/msf/core/exploit/capture.rb:113:in`open_pcap'

[-]/opt/metasploit/msf3/modules/auxiliary/scanner/ip/ipidseq.rb:60:in`run_host'

[-]/opt/metasploit/msf3/lib/msf/core/auxiliary/scanner.rb:94:in`blockinrun'

[-]/opt/metasploit/msf3/lib/msf/core/thread_manager.rb:100:in`call'

[-]/opt/metasploit/msf3/lib/msf/core/thread_manager.rb:100:in`blockinspawn




At this point I have no clue what to do.I have searched for a solution for two hours straight now and found nothing.

Thanks a head of time.





#2midnitesnake

Hak5Ninja


DuckyModerators


554posts

Gender:Male

Location:Earth

Interests:Ducky,Pineapple

Posted29January2013-02:41AM

Your network device is set to usb mon1,shouldn't it be eth0 or wlan0 depending on network/wifinetwork?


Do a "show options".You probably need"set interface eth0"or somethings imilar like eth*.


你可能感兴趣的:(filter,Invalid,nmap,Backtrack,端口扫描,BPF)