FluxionNetwork / fluxion

Fluxion is a remake of linset by vk496 with enhanced functionality.
https://fluxionnetwork.github.io/fluxion/
GNU General Public License v3.0
4.82k stars 1.39k forks source link

Not finding handshake #1132

Open cradcore opened 1 year ago

cradcore commented 1 year ago

Bug Report

Summary

Regardless of whether I choose passive or active attack in handshake snooper, fluxion is not picking up the handshake, even though it is showing up in the airodump-ng output

What is the current behaviour?

image As you can see in the image, the terminal window that pops up for airodump-ng captures a WPA handshake (as well as PMKID), but fluxion never recognizes this.

This happens regardless of

How to reproduce

Spin up fluxion, select handshake snooper, choose any options, wait for a handshake to show up in the airodump-ng window, and fluxion will not pick this up on the next validation.

If the current behaviour is a bug, please provide the steps to reproduce it.
What do you think the expected behaviour should be?

Fluxion should recognize a handshake is captured

Specs

Paste the output of ./script/diagnostics.sh [interface]

FLUXION Info

FLUXION V6.10

BASH Info

GNU bash, version 5.1.16(1)-release (x86_64-pc-linux-gnu) Copyright (C) 2020 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html

This is free software; you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Path: /usr/bin/bash

Interface (wlan0) Info

Device: phy5 Driver: ath9k_htc Chipset: Qualcomm Atheros Communications AR9271 802.11n Master Modes Yes Injection Test: Injection is working!

XTerm Infos

Version: XTerm(378) Path: /usr/bin/xterm Test: XServer/XTerm success!

HostAPD Info

hostapd v2.10 User space daemon for IEEE 802.11 AP management, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator Copyright (c) 2002-2022, Jouni Malinen j@w1.fi and contributors Path: /usr/bin/hostapd

Aircrack-ng Info

Aircrack-ng 1.7 - (C) 2006-2022 Thomas d'Otreppe https://www.aircrack-ng.org

Pyrit Info

Pyrit 0.5.0 (C) 2008-2011 Lukas Lueg - 2015 John Mora https://github.com/JPaulMora/Pyrit This code is distributed under the GNU General Public License v3+ Scapy Version: git-archive.dev95ba5b850 Warning: Pyrit has been reported to be incompatible with scapy version 2.4.0 and above. Consult the wiki for further information. This should not affect you, if you don't choose to use pyrit in the script.

System Info

Chipset: Linux version 6.1.7-zen1-1-zen (linux-zen@archlinux) (gcc (GCC) 12.2.1 20230111, GNU ld (GNU Binutils) 2.40) #1 ZEN SMP PREEMPT_DYNAMIC Wed, 18 Jan 2023 19:54:40 +0000

Chipset

Chipset: ath9k_htc Chipset support ap mode Chipset support monitor mode Don't reseve all required information

ElongatedTusk commented 1 year ago

Spin up fluxion, select handshake snooper, choose any options, wait for a handshake to show up in the airodump-ng window, and fluxion will not pick this up on the next validation.

What happens when you capture the handshake yourself using airodump-ng and then feed Fluxion the cap file when it prompts you during a Captive Portal attack? Does it say: "Error invalid hash" ?

vbunny503 commented 1 year ago

Which version of Fluxion you are using. I have been using the older version and it was working like charm. Few days back i have installed Kali 2023 and Fluxion latest version(6.11). I too ran into the same issue. Its de authenticating clients, sending packets but not able to capture the HS file. I have changes attack mode, Hash verification method but still no luck. I am going to try with a different network Adapter just to see if its Adapter issue or fluxion latest version has some issue. will keep you posted.

apdo3 commented 11 months ago

ارجو حل نفس المشكلة

cjb900 commented 11 months ago

@apdo3 instead of just commenting on this post open a new issue fill out rhe issue template and then someone can try to help