snowflakekiller / wifite

Automatically exported from code.google.com/p/wifite
GNU General Public License v2.0
0 stars 0 forks source link

WPA2/WPA doesn't work in r65 [latest one] #38

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. Scan 
2. Hack
3. Wait
4. Timeout

What is the expected output? What do you see instead?
The key from WPA2/WPA network

What version of the product are you using? On what operating system?
I am using the latest version on Ubuntu 10.04.1 LTS

Please provide any additional information below.
After it tries to hack the wpa, it basically tells me 'Timeout' Exit and close. 
I never get the key which I'm running the program for.

Original issue reported on code.google.com by abdusame...@gmail.com on 20 Feb 2011 at 6:34

GoogleCodeExporter commented 9 years ago
[deleted comment]
GoogleCodeExporter commented 9 years ago
Do you have the handshake or the timeout is on crack process?

Original comment by JMChia on 22 Feb 2011 at 12:51

GoogleCodeExporter commented 9 years ago
I think, before it got a handshake, it basically 'timed out'

Original comment by sir...@gmail.com on 22 Feb 2011 at 8:24

GoogleCodeExporter commented 9 years ago
i also had a problem when to crack WPA2-PSK..
normally its "waiting for handshake" and then "time out"

Original comment by smatna...@gmail.com on 23 Feb 2011 at 2:01

GoogleCodeExporter commented 9 years ago
it's really annoying. I had to guess his password which turned out to be 
12345678. but i still want to try other networks

Original comment by sir...@gmail.com on 23 Feb 2011 at 7:03

GoogleCodeExporter commented 9 years ago
@sir508,

"I had to guess his password." Attacking other people's wireless networks, 
cracking their password, or connecting to them without permission is ILLEGAL. 
You will get no help from me.

@abdusamed,

You said "WPA2/WPA doesn't work in r65". I need more information.

Did WPA capture/crack work in r64? r63? Has it ever worked for you? 

You're running Ubuntu 10.04. Have you tried using Backtrack 4 R2, the operating 
system Wifite was designed for?

Does your wireless device support injection? What chipset is it? Are your 
wireless drivers patched for injection?

As far as the 'timeout' problem... Have you tried using the "endless" wait 
option (in the GUI), or "-wpaw 0" (in the command-line arguments)?  These 
options make Wifite never "timeout".

Original comment by der...@gmail.com on 25 Feb 2011 at 6:50

GoogleCodeExporter commented 9 years ago
To clarify for others that are not getting success with WPA cracking: 

WPA cracking is not an exact science.  A handshake is required to efficiently 
crack a WPA password.  Getting a handshake can take hours, days, weeks, or 
months if no one ever connects to the access point. And even if you do get a 
handshake, there is no guarantee that you will guess the password during the 
dictionary attack, which can take a long time.

If you get disappointed after 5 minutes, you will be sorely disappointed after 
running a dictionary attack on a handshake for 3 days.

Original comment by der...@gmail.com on 25 Feb 2011 at 6:59

GoogleCodeExporter commented 9 years ago
This is still an issue for WPA2-PSK "for me anyway", does anyone know the last 
good version WPA worked on?

Original comment by emada.ad...@gmail.com on 14 Nov 2011 at 5:18

GoogleCodeExporter commented 9 years ago
same result in Backtrack 5 R3, never got handshake
i've tried got handshake with pure airodump - working, but in wifite is not.
i'm using latest svn version

Original comment by artur.ko...@gmail.com on 28 Jan 2013 at 1:53