Closed vom513 closed 6 years ago
Narrowed it down a bit more - aircrack segfaults when loading/cracking a file that's IV's only (i.e. what wifite does, and should/has worked fine for ages). I tested aircrack (airodump) without --ivs and it worked as expected. I ran a new airodump with --ivs and aircrack doesn't know the ESSID and also says encryption is unknown - and then segfault.
I uninstalled the Kali package of aircrack-1.4 and got 1.3 from the Github releases section. It now works as expected (wifite now says "...and cracking"). I have a message posted (well waiting on moderation) on the aircrack forum, I'll see what they say. 1.4 certainly seems to choke on .ivs files, 1.3 works as it always has.
Also to be clear - I get that this is an aircrack issue, and not necessarily wifite. I just wanted derv/others to be aware of this if other reports come in of this issue. I'd also be very interested to see if any others can reproduce this (latest Kali and/or aircrack >= 1.4.)
This is now fixed in -current (git) in aircrack. I just wanted to file this issue so you guys were aware if anyone running aircrack-1.4 reports a WEP issue for wifite.
https://github.com/aircrack-ng/aircrack-ng/commit/d3d7961a7f1c0b549db02e771686fb90b3e1c050
Hello,
So I saw Kali had a point release today, so I updated. Previous to this wifite2-current seemed to have been working well. After upgrading, it seems like perhaps something has changed in the aircrack-ng suite. When doing a WEP attack, I typically have a lot of success with the first attack (ARP replay).
Now it seems that wifite registers the data frame incrementing quickly after the first ARP "lights the fuse". When it gets to 10000, cracking begins. However, aircrack segfaults (seen via dmesg). Wifite doesn't seem to make note of this, and it seems like it just keeps trying to run aircrack (as seen from continuous segfaults in dmesg). I've also peeked to find the tmp file and ran aircrack manually against it. It seems to hold steady at only 8 IVs ?!
I've tried running aircrack-ng "the long way" and it seems to work. However, it still seems like something is off from past versions of aircrack/kali.