Can't reproduce example-pmf-deauth
Hello, I am trying the deauth attack on WPA3.
I have three root shells with venv enabled.
First of all I have created three interfaces with
./setup/setup-hwsim.sh 3
and enabled the WPA3 settings by running
./load-config.sh wpa3-personal-pmf
then, in one shell I have activated the AP
./hostap.py wlan0 --ap
in another one, I have connected a client with
./hostap.py wlan1
and finally, I tried the attack with
./run.py wlan2 example-pmf-deauth
and this is the result in the last shell
[21:40:56] Using interface monwlan2 (mac80211_hwsim) to inject frames. [21:40:56] Starting daemon using: ./dependencies/hostap_2_10/wpa_supplicant/wpa_supplicant -Dnl80211 -i wlan2 -c ./setup/supplicant.conf -W -K Successfully initialized wpa_supplicant nl80211: Could not set interface 'p2p-dev-wlan2' UP nl80211: deinit ifname=p2p-dev-wlan2 disabled_11b_rates=0 p2p-dev-wlan2: Failed to initialize driver interface p2p-dev-wlan2: CTRL-EVENT-DSCP-POLICY clear_all P2P: Failed to enable P2P Device interface wlan2: SME: Trying to authenticate with 02:00:00:00:00:00 (SSID='testnetwork' freq=2412 MHz) wlan2: SME: Trying to authenticate with 02:00:00:00:00:00 (SSID='testnetwork' freq=2412 MHz) wlan2: PMKSA-CACHE-ADDED 02:00:00:00:00:00 0 wlan2: Trying to associate with 02:00:00:00:00:00 (SSID='testnetwork' freq=2412 MHz) wlan2: Associated with 02:00:00:00:00:00 wlan2: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 wlan2: WPA: Key negotiation completed with 02:00:00:00:00:00 [PTK=CCMP GTK=CCMP] wlan2: CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:00:00 completed [id=0 id_str=] [21:40:59] Loaded pairwise and group encryption keys. [21:40:59] Trigger = Connected. [21:40:59] Generating example-pmf-deauth test case. [21:41:01] Injected <Dot11 subtype=Association Request type=Management addr1=02:00:00:00:00:00 (RA=DA) addr2=ff:ff:ff:ff:ff:ff (TA=SA) addr3=02:00:00:00:00:00 (BSSID/STA) |<Dot11AssoReq |>>
It seems that it managed to inject something but without successfully attack. What's going wrong? Thank you in advance.