-
Notifications
You must be signed in to change notification settings - Fork 987
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
An invalid "valid" handshake with only 2 first EAPOL messages (same authentication sequence and replay counter) #2244
Comments
Pyrit is a little bit old (and deprecated), but hcxtools can confirm this behavior, too (and some other problems). Please notice:
Unfortunately it looks like the "Full capture" dump files are cleaned somehow by the dumper, too (ESSID or BSSID filter in use?)
|
To verify that the EAPOL messages are converted to valid MESSAGE PAIRS, it would be nice to comment the the correct password and the "false" password, too. |
How would you make use of it? I mean, what are the exact steps to process the operation you mentioned? |
Commands to verify that the passwords can be recovered from all (M2M3 from first with correct password and M1M2 from second with false password) converted hashes:
If hascat is able to recover both passwords (correct one and false one) from the converted hashes, we know that the conversion process worked as expected. BTW:
We can recover Pyrit is an ancient tool, at least 6 hears old and no longer maintained. It shouldn't be used as reference any longer. Cleaning of dump files is not necessary and very dangerous, because it will remove some important frames. @aircrack-ng please consider to remove wpaclean because it is not longer necessary and cleaned dump files are mostly undesirable or not accepted, e.g.: |
Issue type
System information
Aircrack-ng version
Pyrit version:
Defect
The page online says:
While testing the tool, a temporary personal Wi-Fi hotspot was created and we tried to connect to it with and without correct PSK. The connection sequences were captured using
airodump-ng
- two captures.WiFi
7e:b2:7d:d4:6d:45
34:1c:f0:cf:27:ae
The issue
aircrack-ng
indicated 1 Handshake for both captures.pyrit
indicated 1 handshake only in the first one.The first full capture (valid PSK):
The second full capture (valid PSK):
The output of
aircrack-ng
andpyrit
analyzations of full and cleaned versions (pyrit
andwpaclean
; more below):Aircrack-ng
Notice: all "valid" handshakes
Pyrit
Notice: only the first is valid and cleaned with
pyrit
, too. Cleaned withwpaclean
fails, though.Cleaning
It's worth to mention:
wpaclean
tool also removes the 3th EAPOL message from the first capture preserving only 1 and 2 (this invalidates a handshake).pyrit
saves a Beacon and all 3 first EAPOL messages, but everything else from the first capture.It's also worth to mention that a cleaning via both tools (
wpaclean
andpyrit
) resulted in EAPOL messages times change and their shift:The first cleaned capture (valid PSK):
pyrit
(2nd EAPOL message is now 3rd):wpaclean
(notice removed 3th EAPOL message and the negative time of the 1st one):The second cleaned capture (invalid PSK):
pyrit
(notice the message reorder and time messing):wpaclean
(notice the negative time of the 1st EAPOL message) :Related information:
The archive which includes all captures: captures.zip
The archive includes:
capture_1_full_1.cap
- Full first capture.capture_2_full_1.cap
- Full second capturecapture_1_pyrit_clean_1.cap
- Cleaned first capture (pyrit
)capture_2_pyrit_clean_1.cap
- Cleaned second capture (pyrit
)capture_1_wpaclean_clean_1.cap
- Cleaned first capture (wpaclean
)capture_2_wpaclean_clean_1.cap
- Cleaned second capture (wpaclean
)The text was updated successfully, but these errors were encountered: