-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not finding handshake #1132
Comments
What happens when you capture the handshake yourself using airodump-ng and then feed Fluxion the cap file when it prompts you during a Captive Portal attack? Does it say: "Error invalid hash" ? |
Which version of Fluxion you are using. I have been using the older version and it was working like charm. Few days back i have installed Kali 2023 and Fluxion latest version(6.11). I too ran into the same issue. Its de authenticating clients, sending packets but not able to capture the HS file. I have changes attack mode, Hash verification method but still no luck. I am going to try with a different network Adapter just to see if its Adapter issue or fluxion latest version has some issue. |
ارجو حل نفس المشكلة |
@apdo3 instead of just commenting on this post open a new issue fill out rhe issue template and then someone can try to help |
Bug Report
Summary
Regardless of whether I choose passive or active attack in handshake snooper, fluxion is not picking up the handshake, even though it is showing up in the airodump-ng output
What is the current behaviour?
As you can see in the image, the terminal window that pops up for airodump-ng captures a WPA handshake (as well as PMKID), but fluxion never recognizes this.
This happens regardless of
How to reproduce
Spin up fluxion, select handshake snooper, choose any options, wait for a handshake to show up in the airodump-ng window, and fluxion will not pick this up on the next validation.
If the current behaviour is a bug, please provide the steps to reproduce it.
What do you think the expected behaviour should be?
Fluxion should recognize a handshake is captured
Specs
Paste the output of
./script/diagnostics.sh [interface]
FLUXION Info
FLUXION V6.10
BASH Info
GNU bash, version 5.1.16(1)-release (x86_64-pc-linux-gnu)
Copyright (C) 2020 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Path: /usr/bin/bash
Interface (wlan0) Info
Device: phy5
Driver: ath9k_htc
Chipset: Qualcomm Atheros Communications AR9271 802.11n
Master Modes Yes
Injection Test: Injection is working!
XTerm Infos
Version: XTerm(378)
Path: /usr/bin/xterm
Test: XServer/XTerm success!
HostAPD Info
hostapd v2.10
User space daemon for IEEE 802.11 AP management,
IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Copyright (c) 2002-2022, Jouni Malinen [email protected] and contributors
Path: /usr/bin/hostapd
Aircrack-ng Info
Aircrack-ng 1.7 - (C) 2006-2022 Thomas d'Otreppe
https://www.aircrack-ng.org
Pyrit Info
Pyrit 0.5.0 (C) 2008-2011 Lukas Lueg - 2015 John Mora
https://github.com/JPaulMora/Pyrit
This code is distributed under the GNU General Public License v3+
Scapy Version: git-archive.dev95ba5b850
Warning: Pyrit has been reported to be incompatible with scapy version 2.4.0 and above. Consult the wiki for further information. This should not affect you, if you don't choose to use pyrit in the script.
System Info
Chipset: Linux version 6.1.7-zen1-1-zen (linux-zen@archlinux) (gcc (GCC) 12.2.1 20230111, GNU ld (GNU Binutils) 2.40) #1 ZEN SMP PREEMPT_DYNAMIC Wed, 18 Jan 2023 19:54:40 +0000
Chipset
Chipset: ath9k_htc
Chipset support ap mode
Chipset support monitor mode
Don't reseve all required information
The text was updated successfully, but these errors were encountered: