Closed GoogleCodeExporter closed 9 years ago
the capture file ist proabably truncated. use stripLive to create a new one
Original comment by lukas.l...@gmail.com
on 31 Dec 2010 at 8:15
[deleted comment]
i tried striplive but it produced the same error. i did clean up the cap using
tshark, and i think pyrit is working now. thanks lukas
Original comment by fooofoo...@gmail.com
on 31 Dec 2010 at 10:35
lukas, i have a new problem. a couple of my captured files are from airbase-ng,
it contains eapol entries from 3 mac address's. fake ap, real ap, and client
ap, and some other ap/client transmitting eapol packets that got logged within
the cap. i used wireshark and extracted all the eapol entries. pyrit produces
this now when I run it with analyze.
# pyrit -r capturedfile analyze
Pyrit 0.3.0 (C) 2008-2010 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing file 'capturedfile' (1/1)...
13 packets (13 802.11-packets), 3 APs
#1: AccessPoint xx:xx:realap:xx ('None')
#0: Station xx:xx:client:xx
#2: AccessPoint xx:xx:fakeap:xx:Xx ('None')
#0: Station xx:xx:client:xx handshake found
#3: AccessPoint xx:xx:other-ap-transmitting-got-logged:Xx ('None')
#0: Station xx:xx:other-ap-transmitting to some client-got-logged:Xx
No valid EAOPL-handshake detected.
Just for extra reference, i used strip anyways on the captured file
# pyrit -r capturedfile -e thessid -o newcapturedfile strip
Pyrit 0.3.0 (C) 2008-2010 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing file 'capturedfile' (1/1)...
13 packets (13 802.11-packets), 3 APs
Picked AccessPoint xx:xx:fakeapmac:xx:xx: automatically...
#1: AccessPoint xx:xx:xx:fakeapmac:xx:('None')
#0: Station xx:xx:clientmac:Xx:Xx (1 authentications)
New pcap-file 'capturedfile' written (2 out of 13 packets)
Cowpatty has no trouble with the both original and extracted eapol captured
file from wireshark
# ./cowpatty -c -2 -r capturedfile
cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>
Collected all necessary data to mount crack against WPA2/PSK passphrase.
# ./aircrack-ng -w password.lst capturedfile
Opening capturedfile
Read 13 packets.
# BSSID ESSID Encryption
1 realap WPA (0 handshake)
2 client WPA (1 handshake)
3 foreign AP(eapol packets logged) WPA (0 handshake)
Index number of target network ?
How can I get pyrit to work with my caps?
Original comment by fooofoo...@gmail.com
on 1 Jan 2011 at 12:05
are you actually able to crack the handshake? aircrack-ng and cowpatty have
lousy handshake reconstruction and may indicate a valid handshake when there is
in fact none. can you send me the dump by email?
Original comment by lukas.l...@gmail.com
on 1 Jan 2011 at 1:01
I just saw that you are using Pyrit 0.3. Can you try using 0.4-dev, which comes
with a completely reworked handshaked detection
Original comment by lukas.l...@gmail.com
on 1 Jan 2011 at 6:08
any update here?
Original comment by lukas.l...@gmail.com
on 7 Jan 2011 at 9:51
Original comment by lukas.l...@gmail.com
on 9 Jan 2011 at 5:15
Original issue reported on code.google.com by
fooofoo...@gmail.com
on 31 Dec 2010 at 8:13