Open deepakdaswani opened 7 years ago
Hey Deepak! Sorry for the delay. I've updated the PoC code does this resolve the issue? If not, what WPA2 mode is being MITM?
Hi Omar. Thanks for your fast reply! I have just tested the new code. Not been able to dedicate a long time to analyze which were the changes. But is still not working for me. It does the same that in the screenshot I sent you. In fact, if I sniff wlan1 now I can see beacon malformed frames... Maybe I'm missing something. Btw, it is WPA2 CCMP . Thanks in advance!
Hi omaidf. Great work with this code! Is this code fully working for the MITM attack? I try to replay it and can't get the client connected to the fake ap. It goes through all the steps, but keeps on sending deauth packets. Meanwhile it sniffes handshake packets which I think correspond to the legitimate packets exchanged between real AP and client. Thanks for your kind attention!