flashnuke / wifi-deauth

A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
GNU General Public License v3.0
313 stars 33 forks source link

Error on running - self._channel_range[ssid_obj.channel][ssid_name] = copy.deepcopy(ssid_obj) #5

Closed johncarterofmars closed 8 months ago

johncarterofmars commented 8 months ago

Hello. I ran into this error when running the script. It counts down all the channels and then returns the error. It seems to be having a hard time compiling the list of SSIDs? I am running this on Ubuntu 20.04 with an external USB capable of monitor mode. Any suggestions? `$ sudo python3 wifi-deauth.py -i wlan1


/ \ / _|/ ___\| \ \ __ __ / || |
\ \/\/ / \
| | __ | | \ \/ __
\ \ | | \ | | \ \ /| || | | | // | |/ /\ /| |\ | | /| | | Y \ _/_/ |||| |_| |____/ _/|__/ __/ || ||__/

Make sure of the following:

  1. You are running as root
  2. You kill NetworkManager (manually or by passing --kill)
  3. Your wireless adapter supports monitor mode (refer to docs)

Written by @flashnuke

[] Setting up monitor mode... [>] Running command -> 'sudo ip link set wlan1 down' [>] Running command -> 'sudo iw wlan1 set monitor control' [>] Running command -> 'sudo ip link set wlan1 up' [] Monitor mode was set up successfully [] Starting AP scan, please wait... (32 channels total) [] Scanning channel 140 (left -> 0)) Traceback (most recent call last): File "/home/usertools/wifi-deauth/wifi-deauth.py", line 270, in attacker.run() File "/home/user/tools/wifi-deauth/wifi-deauth.py", line 209, in run self.target_ssid = self._start_initial_ap_scan() ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/home/user/tools/wifi-deauth/wifi-deauth.py", line 123, in _start_initial_ap_scan self._channel_range[ssid_obj.channel][ssid_name] = copy.deepcopy(ssid_obj)


KeyError: 149`
flashnuke commented 8 months ago

sorry for the late reply I've made a fix, please clone from this branch and try again: https://github.com/flashnuke/wifi-deauth/tree/fix/missing_channel The change I've made is in this pull request https://github.com/flashnuke/wifi-deauth/pull/6 ~~ It seems that scapy is picking up packets from channels that are supposedly "not supported" (they don't show up on your iwlist {interface} channel command output) this could happen due to several reasons, the main suspect in this case imo is channel overlapping - the actual channel is not 149 as picked up by scapy, but another channel that overlaps this range

the fix I propose would set the SSID's channel as the current channel the interface is set at, when the channel shown in the packet (which is read by scapy) is not in the list of the supported channels

flashnuke commented 8 months ago

merged, pls let me know if this issue persists