You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi omaidf. Great work with this code!
Is this code fully working for the MITM attack? I try to replay it and can't get the client connected to the fake ap. It goes through all the steps, but keeps on sending deauth packets. Meanwhile it sniffes handshake packets which I think correspond to the legitimate packets exchanged between real AP and client.
Thanks for your kind attention!
The text was updated successfully, but these errors were encountered:
Hi Omar. Thanks for your fast reply! I have just tested the new code. Not been able to dedicate a long time to analyze which were the changes. But is still not working for me. It does the same that in the screenshot I sent you. In fact, if I sniff wlan1 now I can see beacon malformed frames...
Maybe I'm missing something.
Btw, it is WPA2 CCMP .
Thanks in advance!
Hi omaidf. Great work with this code!
Is this code fully working for the MITM attack? I try to replay it and can't get the client connected to the fake ap. It goes through all the steps, but keeps on sending deauth packets. Meanwhile it sniffes handshake packets which I think correspond to the legitimate packets exchanged between real AP and client.
Thanks for your kind attention!
The text was updated successfully, but these errors were encountered: