-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix & Improve WEP attacks #27
Comments
For #27 * Shows status of chopchop and arpreplay attacks. * Fakeauth runs continously in the background, reassociating every 30 sec * Detects fakeauth success/failure, shows in attack status line.
Beefed up process-output parsing so WEP attacks show PPS, detect when we are authenicated/not-auth'd, and shows progress on I need another router that's susceptible to the WEP And other attacks don't seem to work for me ( Only these WEP attacks work against my test router: |
Should make troubleshooting #27 easier.
…WEP attack. * Simplified HEX/ASCII conversion. Avoids infinite loop 🤔 * Added integration test: python -m wifite.tools.aircrack Should resolve "hanging" issues during WEP attacks such as #27.
No problem sir, happy to help. Great fix |
Bugfix when chopchop fails. Displays aircrack's error message when chopchop fails. For improving WEP attacks in #27
Alright the commit above should make chopchop more-functional, provides real-time output of the current byte, % completed, etc. I think WEP attacks are in a good place now. I can revisit this later if people are still seeing problems.. |
The WEP attacks work good. But some times when the number of required IVS are huge , the program hangs when it starts cracking say after 60000 IVS with the --wepca option. I was wondering if it is possible to add a switch to save the captured IVS like the one that existed in the previous version of Wifite. It will be helpful to have a switch like that , it will come handy. |
Apparently there's issues in the current version of The issue is that aircrack-ng will randomly segfault (3/5 times) when providing multiple I checked out the latest version of aircrack-ng (1.2 rev 60e0a710) and this bug has been fixed (5/5 times the new version the cracked key). If I add support for retaining previously-captured I'll look at adding a |
The package (aircrack-ng v1.2) is waiting to be pulled to Kali repos. It will happen anytime. |
I tried
chopchop
last night and it didn't work for me.The
chopchop
attack succeeded and generated a.xor
which was forged into a replayable.cap
file.But the script did not replay the
.cap
file.I'm worried other attacks are not working as-expected (e.g. when no clients are connected).
Also, the output of
chopchop
was terrible -- only showingIVs
. Ideally the script would parse the output ofaireplay-ng --chopchop
, show the current % completed, and any errors/warnings output by the program.The text was updated successfully, but these errors were encountered: