Replies: 9 comments 18 replies
-
Should strengthen two attack behaviors rules |
Beta Was this translation helpful? Give feedback.
-
BTW2: While an attack filter like this: If that "wlan addr3 ffffffffffff" is not present in the BPF, undirected PROBEREQUETs are filtered out. |
Beta Was this translation helpful? Give feedback.
-
Situations like these |
Beta Was this translation helpful? Give feedback.
-
I forgot to mention: BTW: Show all frames addressed to an AP: This might help to build your filter. tshark is you friend and the filter syntax is the same as the filter syntax used by hcxdumptool. |
Beta Was this translation helpful? Give feedback.
-
To exactly monitor what happens if you set "wlan addr3 MAC_AP" as BPF to hcxdumptool, run tshark in parallel on the same interface: As mentioned in several posts, hcxdumptool is 100% compatible to tshark. You always can run tshark in parallel to hcxdumptool to get additional information about the target or to monitor what's going on (or why does not work as expected). |
Beta Was this translation helpful? Give feedback.
-
This not a filter issue ! it is tool attack rule issue |
Beta Was this translation helpful? Give feedback.
-
And have patience until the "+" disappeared in the R column: |
Beta Was this translation helpful? Give feedback.
-
That is either a problem of your configuration (KALI) or your attack filter or your workflow. Everything is working as expected:
BTW:
because hcxdumptool has been told (by option exitoneapol) to terminate after an EAPOL MESSAGE PAIR has been received. |
Beta Was this translation helpful? Give feedback.
-
Sorry.. This default value should increased to: Otherwise, it easily capture fail |
Beta Was this translation helpful? Give feedback.
-
@ZerBea
Run command test
scan
Create BPF
sudo hcxdumptool -i wlan0 -c 1a -w cap.pcapng --rds=1 --bpf=attack.bpf
After launching an attack, my observe the client reconnecting to the AP (But only once),
I observe chart not show a captured handshake data, I also checked the pcapng file, no m1m2(at least)
The problem is that after launching an attack, hcxdumptool seems never launched another attack, my observed the client no reconnection behavior ,causing no capture the handshake.
the continued attack behavior ineffective ? or auto stop attack ?
After launching one attack, the attack will auto stop ?
AP and client in my 2m
Beta Was this translation helpful? Give feedback.
All reactions