I am trying to set up a static Fake AP attack and this is the error I am getting along with all input and output:


Code:
 ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ 
||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 	Version 3.7 - Garden of Your Mind

At any time, ctrl+c  to cancel and return to the main menu

1.  Prerequisites & Configurations
2.  Poisoning Attacks
3.  FakeAP Attacks
4.  Data Review
5.  Exit
q.  Quit current poisoning session

Choice: 3








 ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ 
||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 	Version 3.7 - Garden of Your Mind

At any time, ctrl+c  to cancel and return to the main menu

1.  FakeAP Attack Static
2.  FakeAP Attack EvilTwin
3.  Karmetasploit Attack
4.  FreeRadius Attack
5.  DoS AP Options
6.  Previous Menu

Choice: 1








 ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ 
||e |||a |||s |||y |||- |||c |||r |||e |||d |||s ||
||__|||__|||__|||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
 	Version 3.7 - Garden of Your Mind

At any time, ctrl+c  to cancel and return to the main menu

Would you like to include a sidejacking attack? [y/N]: n
Network Interfaces:

eth0       74:d0:2b:75:07:a4             IP:192.168.1.3 
wlan0      1c:3e:84:45:f4:5d             


Interface connected to the internet (ex. eth0): eth0


Interface	Chipset		Driver

wlan0		Unknown 	rt2800pci - [phy0]

Wireless interface name (ex. wlan0): wlan0
ESSID you would like your rogue AP to be called, example FreeWiFi: FreeWifi
Channel you would like to broadcast on: 6
[*] Your interface has now been placed in Monitor Mode

mon0		Unknown 	rt2800pci - [phy0]


Enter your monitor enabled interface name, (ex: mon0): mon0
Enter your tunnel interface, example at0: at0
Do you have a dhcpd.conf file to use? [y/N]: n
Network range for your tunneled interface, example 10.0.0.0/24: 10.0.0.0/24
Enter the IP address for the DNS server, example 8.8.8.8: 8.8.8.8

[*] Creating a dhcpd.conf to assign addresses to clients that connect to us.
[*] Launching Airbase with your settings.
[*] Configuring tunneled interface.
[*] Setting up iptables to handle traffic seen by the tunneled interface.
[*] Launching Tail.
[*] DHCP server starting on tunneled interface.

dhcpd: unrecognized service
[*] Launching SSLStrip...

[*] Launching ettercap, poisoning specified hosts.

[*] Configuring IP forwarding...

[*] Launching URLSnarf...

[*] Launching Dsniff...

[*] Do you ever imagine things in the garden of your mind?

Thanks in advanced!

Bgordy2013