I have connected with AP, Frames are detected and also krack attack stated using this script (./krack-ft-test.py). But i didn't get any "Replaying Reassociation Request" or "IV reuse detected (IV=1, seq=0). AP is vulnerable!" on the output screen. can any one explain me about this issue.Below is terminal log
Note: I am using WPA2-PSK security mode.
root@wipro123-Latitude-E5430-non-vPro:/home/wipro123/krackattacks-scripts/krackattack# ./krack-ft-test.py wpa_supplicant -D nl80211 -i wlp2s0 -c network.conf
[12:53:53] Note: disable Wi-Fi in your network manager so it doesn't interfere with this script
Successfully initialized wpa_supplicant
wlp2s0: SME: Trying to authenticate with 30:91:8f:7b:a8:47 (SSID='guru_5G' freq=5240 MHz)
wlp2s0: Trying to associate with 30:91:8f:7b:a8:47 (SSID='guru_5G' freq=5240 MHz)
[12:53:57] Detected Authentication frame, clearing client state
[12:53:57] Detected Authentication frame, clearing client state
[12:53:57] Detected normal association frame
wlp2s0: Associated with 30:91:8f:7b:a8:47
wlp2s0: WPA: Key negotiation completed with 30:91:8f:7b:a8:47 [PTK=CCMP GTK=CCMP]
wlp2s0: CTRL-EVENT-CONNECTED - Connection to 30:91:8f:7b:a8:47 completed [id=0 id_str=]
[12:53:57] AP transmitted data using IV=1 (seq=0)
[12:54:37] AP transmitted data using IV=382 (seq=1)
[12:54:38] AP transmitted data using IV=383 (seq=2)
[12:54:38] AP transmitted data using IV=384 (seq=3)
[12:54:38] AP transmitted data using IV=385 (seq=4)
[12:54:38] AP transmitted data using IV=386 (seq=5)
[12:54:39] AP transmitted data using IV=409 (seq=6)
[12:54:40] AP transmitted data using IV=440 (seq=7)
[12:54:41] AP transmitted data using IV=475 (seq=8)
[12:54:41] AP transmitted data using IV=490 (seq=9)
I have connected with AP, Frames are detected and also krack attack stated using this script (./krack-ft-test.py). But i didn't get any "Replaying Reassociation Request" or "IV reuse detected (IV=1, seq=0). AP is vulnerable!" on the output screen. can any one explain me about this issue.Below is terminal log
Note: I am using WPA2-PSK security mode.
root@wipro123-Latitude-E5430-non-vPro:/home/wipro123/krackattacks-scripts/krackattack# ./krack-ft-test.py wpa_supplicant -D nl80211 -i wlp2s0 -c network.conf [12:53:53] Note: disable Wi-Fi in your network manager so it doesn't interfere with this script Successfully initialized wpa_supplicant wlp2s0: SME: Trying to authenticate with 30:91:8f:7b:a8:47 (SSID='guru_5G' freq=5240 MHz) wlp2s0: Trying to associate with 30:91:8f:7b:a8:47 (SSID='guru_5G' freq=5240 MHz) [12:53:57] Detected Authentication frame, clearing client state [12:53:57] Detected Authentication frame, clearing client state [12:53:57] Detected normal association frame wlp2s0: Associated with 30:91:8f:7b:a8:47 wlp2s0: WPA: Key negotiation completed with 30:91:8f:7b:a8:47 [PTK=CCMP GTK=CCMP] wlp2s0: CTRL-EVENT-CONNECTED - Connection to 30:91:8f:7b:a8:47 completed [id=0 id_str=] [12:53:57] AP transmitted data using IV=1 (seq=0) [12:54:37] AP transmitted data using IV=382 (seq=1) [12:54:38] AP transmitted data using IV=383 (seq=2) [12:54:38] AP transmitted data using IV=384 (seq=3) [12:54:38] AP transmitted data using IV=385 (seq=4) [12:54:38] AP transmitted data using IV=386 (seq=5) [12:54:39] AP transmitted data using IV=409 (seq=6) [12:54:40] AP transmitted data using IV=440 (seq=7) [12:54:41] AP transmitted data using IV=475 (seq=8) [12:54:41] AP transmitted data using IV=490 (seq=9)