Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

POC attack code updated? #2

Open
deepakdaswani opened this issue Nov 21, 2017 · 2 comments
Open

POC attack code updated? #2

deepakdaswani opened this issue Nov 21, 2017 · 2 comments
Assignees

Comments

@deepakdaswani
Copy link

Hi omaidf. Great work with this code!
Is this code fully working for the MITM attack? I try to replay it and can't get the client connected to the fake ap. It goes through all the steps, but keeps on sending deauth packets. Meanwhile it sniffes handshake packets which I think correspond to the legitimate packets exchanged between real AP and client.
Thanks for your kind attention!

github issue

@omaidf
Copy link
Owner

omaidf commented Nov 22, 2017

Hey Deepak! Sorry for the delay. I've updated the PoC code does this resolve the issue? If not, what WPA2 mode is being MITM?

@omaidf omaidf self-assigned this Nov 22, 2017
@deepakdaswani
Copy link
Author

Hi Omar. Thanks for your fast reply! I have just tested the new code. Not been able to dedicate a long time to analyze which were the changes. But is still not working for me. It does the same that in the screenshot I sent you. In fact, if I sniff wlan1 now I can see beacon malformed frames...
Maybe I'm missing something.
Btw, it is WPA2 CCMP .
Thanks in advance!

captura de pantalla 2017-11-22 a las 22 10 14

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants