aircrack-ng
aircrack-ng copied to clipboard
Unable to complete "attacks" - Fragment attacks/etc.
Issue type
REMOVE THOSE WHICH DO NOT APPLY
- Defect - Unexpected behavior (obvious or confirmed in the forum)
System information
- OS: Kali 2020
- CPU: Virtual Intel Core i7 7700k
- Wireless card and chipset (if relevant): Alfa Networks AWUS036NHA
Aircrack-ng version
- Version: 1.6 & fresh github pull
- Commit Revision hash:
Defect
How to reproduce the issue
I'm using virtual machines for this: Kali 2020 (has aircrack-ng v 1.6), and a secondary test machine that is kali 2016.2 (has aircrack-ng 1.2 rc4).
So, I'm taking the Offensive-Security Wireless course. I have a dlink 601 router, and the alfa usb card. I setup the dlink router as directed in the course (WEP, open mode, some basic keys). Using Kali 2020, and following just about any guide, I turn on monitor mode with airmon-ng.
I then do the initial fake auth, which works. Then immediately do the fragment attack (-5). It gets the first packet as shown in the console output below, however if just stays there and does nothing else. I tested using the same commands and whatnot using kali 2016.2, and the fragment attack works. I did a reboot of the Kali 2020 VM and re-tested with no change. I then did a git pull of the current github and performed the installation steps and did the reconfigure with-experimental options. Did the make/make install. Same result. Any help would be appreciated even if its just something stupid I'm forgetting to do.
raithedavion@kali2020:~/aircrack-ng$`` sudo aireplay-ng -1 0 -e dlink_vuln -a 5C:d9:98:6a:bf:3e -h 00:C0:CA:98:4F:23 wlan0mon
21:44:18 Waiting for beacon frame (BSSID: 5C:D9:98:6A:BF:3E) on channel 6
21:44:18 Sending Authentication Request (Open System) [ACK]
21:44:18 Authentication successful
21:44:18 Sending Association Request [ACK]
21:44:18 Association successful :-) (AID: 1)
raithedavion@kali2020:~/aircrack-ng$ sudo aireplay-ng -5 -b 5C:D9:98:6A:BF:3E -h 00:C0:CA:98:4F:23 wlan0mon
21:44:28 Waiting for beacon frame (BSSID: 5C:D9:98:6A:BF:3E) on channel 6
21:44:28 Waiting for a data packet...
Read 251 packets...
Size: 144, FromDS: 1, ToDS: 0 (WEP)
BSSID = 5C:D9:98:6A:BF:3E
Dest. MAC = 33:33:00:00:00:01
Source MAC = 5C:D9:98:6A:BF:3E
0x0000: 0842 0000 3333 0000 0001 5cd9 986a bf3e .B..33....\..j.>
0x0010: 5cd9 986a bf3e d0b5 e0a8 2400 2faf d225 \..j.>....$./..%
0x0020: a225 f1f2 6d9e b16d f8e4 2845 9b6b f7ca .%..m..m..(E.k..
0x0030: b173 cffa 48a4 6624 566a 45bb 27da fc46 .s..H.f$VjE.'..F
0x0040: 7654 16f2 098a 18e2 3cc1 ffd2 68a6 8c8f vT......<...h...
0x0050: 517b 3e5d d5ed aa93 d59e 23b7 f357 b3ef Q{>]......#..W..
0x0060: 4d3d 91b9 f587 1536 1cce 9702 ceb3 db3c M=.....6.......<
0x0070: e956 fcb1 f5a6 004e 4a2f 8136 a44d a483 .V.....NJ/.6.M..
0x0080: 7d72 1758 d486 6d09 ecfc 47b1 71ef 3f5f }r.X..m...G.q.?_
Use this packet ? y
Saving chosen packet in replay_src-0712-214433.cap
21:44:35 Data packet found!
21:44:35 Sending fragmented packet
21:44:35 Got RELAYED packet!!
21:44:35 Trying to get 384 bytes of a keystream
^C
Related issues
None.