You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thank you this script.
I try to this script.Attacker Kali Linux be attacked Ubuntu 15.10 (wpa_supplicant 2.4)
I check disconnect real channel(1ch). And I check rogue channel(11ch).
Be attacked Client unconnected. After try to rogue channel but require password.
and end krackattacks-poc-zerokey.py I don't know why don't work properly.
[11:23:16] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1412)
[11:23:17] Rogue channel: 00:00:00:00:00:00 -> ff:ff:ff:ff:ff:ff: ProbeReq(seq=4082)
[11:23:17] Rogue channel: 00:00:00:00:00:00 -> ff:ff:ff:ff:ff:ff: ProbeReq(seq=4083)
[11:23:17] Rogue channel: injected Disassociation to 00:00:00:00:00:00
[11:23:17] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1413)
[11:23:17] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1414)
Traceback (most recent call last):
File "./krack-all-zero-tk.py", line 1018, in
attack.run(strict_echo_test=args.strict_echo_test)
File "./krack-all-zero-tk.py", line 950, in run
if self.sock_rogue in sel[0]: self.handle_rx_roguechan()
File "./krack-all-zero-tk.py", line 760, in handle_rx_roguechan
if Dot11Beacon in p and ord(get_tlv_value(p, IEEE_TLV_TYPE_CHANNEL)) == self.netconfig.rogue_channel:
TypeError: ord() expected string of length 1, but NoneType found
[11:23:17] Closing hostapd and cleaning up ...
The text was updated successfully, but these errors were encountered:
Smith31
changed the title
Try to krackattacks-poc-zerokey but do not create rouge AP channelX
Try to krackattacks-poc-zerokey but doen not work properly
Jul 26, 2018
Thank you this script.
I try to this script.Attacker Kali Linux be attacked Ubuntu 15.10 (wpa_supplicant 2.4)
I check disconnect real channel(1ch). And I check rogue channel(11ch).
Be attacked Client unconnected. After try to rogue channel but require password.
and end krackattacks-poc-zerokey.py I don't know why don't work properly.
[11:23:16] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1412)
[11:23:17] Rogue channel: 00:00:00:00:00:00 -> ff:ff:ff:ff:ff:ff: ProbeReq(seq=4082)
[11:23:17] Rogue channel: 00:00:00:00:00:00 -> ff:ff:ff:ff:ff:ff: ProbeReq(seq=4083)
[11:23:17] Rogue channel: injected Disassociation to 00:00:00:00:00:00
[11:23:17] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1413)
[11:23:17] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1414)
Traceback (most recent call last):
File "./krack-all-zero-tk.py", line 1018, in
attack.run(strict_echo_test=args.strict_echo_test)
File "./krack-all-zero-tk.py", line 950, in run
if self.sock_rogue in sel[0]: self.handle_rx_roguechan()
File "./krack-all-zero-tk.py", line 760, in handle_rx_roguechan
if Dot11Beacon in p and ord(get_tlv_value(p, IEEE_TLV_TYPE_CHANNEL)) == self.netconfig.rogue_channel:
TypeError: ord() expected string of length 1, but NoneType found
[11:23:17] Closing hostapd and cleaning up ...
The text was updated successfully, but these errors were encountered: