Open s0i37 opened 1 year ago
My pcap file has m1m2 (wrong pass) and m1m2m3(valid pass), obviously I cant brute it without cleaning:
hcxpcapngtool m1m2_m1m2m3.pcap -o eapol.txt --all
hcxhashtool -i eapol.txt --authorized -o eapol_valid.txt
hcxhash2cap --pmkid-eapol=eapol_valid.txt -c out-m1m2.cap
Issue type
System information
Aircrack-ng version
Defect
About
wpaclean
said - it saves only 4-way handshakes. In other words it is valid handshakes. Howeverwpaclean
saves also and half-handshakes.Details
When I move across physical perimeter I make deauth and online bruteforcing attacks in the same time. And because of I sends many wrong attempts I can't distinguish handshakes of real clients.
How to reproduce the issue
Just send the wrong PSK password.