Fix but when cracking WPA handshakes.

Resolves #68
This commit is contained in:
derv82
2018-02-28 05:09:11 -05:00
parent 6249d53819
commit 222b89dee6
2 changed files with 4 additions and 5 deletions

1
.gitignore vendored
View File

@@ -4,3 +4,4 @@ py/hs/
hs/ hs/
*.bak *.bak
.idea/ .idea/
cracked.txt

View File

@@ -54,7 +54,7 @@ class AttackWPA(Attack):
if key is None: if key is None:
self.success = False self.success = False
else: else:
self.crack_result = CrackResultWPA(bssid, essid, handshake.capfile, key) self.crack_result = CrackResultWPA(handshake.bssid, handshake.essid, handshake.capfile, key)
self.crack_result.dump() self.crack_result.dump()
self.success = True self.success = True
return self.success return self.success
@@ -75,11 +75,10 @@ class AttackWPA(Attack):
self.clients = [] self.clients = []
bssid = airodump_target.bssid
essid = airodump_target.essid if airodump_target.essid_known else None
# Try to load existing handshake # Try to load existing handshake
if Configuration.ignore_old_handshakes == False: if Configuration.ignore_old_handshakes == False:
bssid = airodump_target.bssid
essid = airodump_target.essid if airodump_target.essid_known else None
handshake = self.load_handshake(bssid=bssid, essid=essid) handshake = self.load_handshake(bssid=bssid, essid=essid)
if handshake: if handshake:
Color.clear_entire_line() Color.clear_entire_line()
@@ -300,4 +299,3 @@ if __name__ == '__main__':
target = Target(fields) target = Target(fields)
wpa = AttackWPA(target) wpa = AttackWPA(target)
wpa.run() wpa.run()