OpenSecurityResearch / hostapd-wpe

Modified hostapd to facilitate AP impersonation attacks
492 stars 97 forks source link

Password Doesnt Show for Wired Attacks #17

Open p3nt4 opened 7 years ago

p3nt4 commented 7 years ago

Hi, I have used this tool successfully for wireless attacks before. I am now trying to use this tool for a wired rogue PEAP attack.

I can see the client connecting: vendor=0 method=1. But when I input a password in the client, the hash doesnt appear in the rogue server.

Any idea how to fix this?

Thanks

minanagehsalalma commented 6 years ago

@p3nt4 hi bro it the hash can be easily cracked rather than wpa-wpa2 ?1!

W00t3k commented 6 years ago

If it's a Macbook it may be your EAP type, if it's Windows 10 and you're using a self signed cert it simply won't connect without modifying the registry (OR GPO Policies). Lots of factors may restrict you connecting to a certain type of network or performing a "rogue attack". It's based on the end device's supplicant support, so an iOS or Mac OS device is going to use different EAP types by default differently. While Windows doesn't even have EAP-GTC or EAP-TTLS support built into the OS for wireless connectivity.