-
Notifications
You must be signed in to change notification settings - Fork 403
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not attacking and deauthenticating clients #121
Comments
Running default options, hcxdumptool will deauthenticate, disassociate and reassociate every to an ACCESS POINT connected CLIENT unless Management Frame Protection is not activated! Please notice: BTW: |
BTW: |
By this commit |
I have tested this in two ways: I have 3 WiFi adapter testing for this. All of them support packet injection and monitoring mode. I will send you details about them. Another thing I noticed is aircrack wasn't able to deauthenticate on 5Ghz only (packet sent successfully with no errors but clients didn't disconnect). (I will verify this now again with different adapters) I will send you more details in a bit, I will do some tests now. |
1- It's my own wifi network and my devices are connected to it. Non of them got disconnected. |
At this moment, I have not seen an adapter that support full packet injection on 5GHz. All of them showing issues. That is the reason why 5GHz is not in automatic mode. |
With hcxdumptool I don't get handshake if I don't manually disconnect the client. So? |
I can't reproduce that.
Explanation: Than the CLIENT run a 4way handshake with the AP. |
Please add output of Please notice that rtl8812au and rtl8188eus adapters are not working as expected! |
Great, thanks. This driver support monitor mode, but not full packet injection: This driver is currently broken: This driver will not work. On mainline kernel neither native monitor mode nor full packet injection available: |
iwlwifi & ath9k_htc are working with me fine on kali-linux. There's one issue, I did hcxdumptool -i wlan1-o dump.pcapng --enable_status=31 |
I did a new installation of latest Kali Linux and now auto de-authentication is working. |
There's some inconsistencies, --do_rcascan doesn't show 5G networks while dumping shows. |
Nice to hear that it is working, now. I don't use KALI, so I don't know what driver versions are inside of this distribution. |
--do_rcascan -s 3 should show 2.4 and 5 GHz networks:
|
I can't reproduce that. Transmitting deauthentications doesn't depend on the channel options. |
for What does Rogue mean? For example |
|
Please take a look at this example: |
I tried two times, and I can confirm to you that using -c option doesn't allow de-authentication to happen. |
without -c I get many death... |
I'm using the correct -c channel and I see network name as beacon but no de-authentication happening. I remove -c option and de-authentication works. |
Let me try different wifi adapter and check.. |
Hmmm. Transmitting deauthentications doesn't depend on the channel or the -c option or the -s option. |
Ok now I tried |
Please add output of Expected output:
|
However, how come I can see 5G network of the same router there and this device doesn't support that and it's on different channel even?
|
The shown 5GHz network isn't real. It is a hcxdumptool simulation of the 5GHz network on 2.4GHz. The CLIENT will be fooled and connect to hcxdumptool. You sould see a M1M2ROGUE. |
Nice! I understand many things now. Also by trying and testing by myself I learn a lot by observing the behavior every run.
as I know wen need only M2M3. How's it different then if we don't see zeroed mentioned? Please explain the use case of Thank you. |
BTW, do you know how to install OpenCL runtime for Intel CPUs on Debian based machines? I'm struggling with that. I have 2X Xeon® E5-4667 v3 with 64 cores in total, it's a waste not to use with hashcat. |
We distingush 2 M4 EAPOL frames: hcxpcapngtool convert only the best handshake for an ESSID - MAC_AP -MAC_STA. That keeps the hash file small. examples: Compare both hash files (best.22000 and all.22000) and you'll notice that all.22000 contain more records. This is the upstream of intel compute runtime: or via Debian packet manager: |
Please notice: |
Yes I understand your points. So for the EAPOL, if I get this it means PSK is not recoverable (Is it called unauthenticated handshake?) :
but if I get this it means it's recoverable, right?
|
Not 100% correct: M1M2 (challenge = not authorized) M1M2 (challenge = not authorized) A valid PSK is recoverable from every NONZEROED message pair (one message from the AP M1 or M3 the other message from the CLIENT M2 or M4). |
Here's an example from my network scan:
Why did I get EAPOL handshake two times from the same client? and why I have [AUTHENTICATION] one time only and I have two handshakes? what does all that mean please? |
hcxdumptool is an attack tool. In case of a successful attack, you will receive the EAPOL messages. |
To avoid spamming the real time waterfall display, hcxdumptool print some information only once at first occurrence. It is described in --help:
|
Some examples: |
Aha, that's why, you are hiding them. |
Can you please elaborate on authenticated handshake and unauthenticated handshake. I once captured unauthenticated one but I don't remember what was the message showing in hcxdumptool output. |
Okay I found the unauthenticated one
Is the PSK recoverable from this? |
Yes, you can recover a PSK from this message pair. The recovered PSK will belong to the network shown as MySSID. |
Please convert your example from here: Than compare both files. You'll notice that you have much more handshakes to choose when running |
What does that mean? I mean what's the point you are telling me? |
Running by default, hcxpcapngtool choose and convert only the best message pair for a hashcat/JtR task. |
I prefer if you can make it output ESSID name next to the hex in the file name, so it will be something like this:
It's difficult now to know which essid is which by looking at the hex |
No. We decided HEX because an ESSID can contain characters from 0x00 to 0xff: |
hcxdumptool still capturing handshakes and PMKIDs from access points that are different than the specified in the list. Why? |
That behavior is explained here:
|
By latest commit: affected by filter: incoming and outgoing traffic
read more, here: affected by filter: outgoing traffic
|
I got one PKMID on 5G band but hcxpcapngtool says it useless PKMID, why? |
Like zeroed M4 messages, PMKIDs and PMKs can be zeroed, too. You can't recover the PSK from them. |
Any update on 5GHz chipsets that can de-authenticate connected users? |
This one is working fine (README.md): Both drivers are part of the mainline kernel. Please notice: |
I have difficulties finding the mentioned models for sale online. Do you know where can I buy them? How about the RTL8814AU (ALFA AWUS1900)? |
There is no RTL 8814AU mainline kernel driver and you have to install the driver from here: Please notice that hcxdumptool doesn't support NETLINK, because NETLINK communication is very much asynchronous. Instead it use ioctl() system calls, which are purely synchronous. The difference is explained here: BTW: |
Oh I didn't see the RTL 8814AU because there is space after RTL |
MT7612U is not better than MT7601U, but it is much newer. All mt76 drivers are fantastic and well maintained. Latest Linux kernel is mandatory! |
Hi ZerBea,
Thanks for the nice tool. The tool is working fine when a device connects to the AP and I can capture the handshake, however if clients are already connected there's no de-authentication happening. I tried both 2.4GHz and 5Ghz. How can I disconnect clients so I can capture the handshake?
Thanks for help!
The text was updated successfully, but these errors were encountered: