Added --nodeauths command, try to fix WEP replay attacks.

Aireplay can optionally NOT store the process output (via `devnull=False`).
By-default, Aireplay attacks will not capture aireplay-ng output, to
avoid deadlock when overloading the OS buffer (see #21).
This commit is contained in:
derv82
2017-05-15 20:36:04 -04:00
parent a8d16d1b69
commit a226cdb9a1
8 changed files with 39 additions and 22 deletions

View File

@@ -68,6 +68,7 @@ class AttackWEP(Attack):
aireplay = Aireplay(self.target, \
wep_attack_type, \
client_mac=client_mac, \
devnull=True,
replay_file=replay_file)
time_unchanged_ivs = time.time() # Timestamp when IVs last changed
@@ -146,9 +147,8 @@ class AttackWEP(Attack):
Color.pl('\n{!} {O}%s attack{R} did not generate' % attack_name +
' a .xor file{W}')
# XXX: For debugging
Color.pl('\noutput:\n')
Color.pl(aireplay.get_output())
Color.pl('')
Color.pl('{?} {O}Command: {R}%s{W}' % aireplay.cmd)
Color.pl('{?} {O}Output:\n{R}%s{W}' % aireplay.get_output())
break
# If .xor exists, run packetforge-ng to create .cap
@@ -172,8 +172,8 @@ class AttackWEP(Attack):
break
else:
Color.pl('\n{!} {O}aireplay-ng exited unexpectedly{W}')
Color.pl('\naireplay.get_output():')
Color.pl(aireplay.get_output())
Color.pl('{?} {O}Command: {R}%s{W}' % aireplay.cmd)
Color.pl('{?} {O}Output:\n%s{W}' % aireplay.get_output())
break # Continue to other attacks
# Check if IVs stopped flowing (same for > N seconds)
@@ -189,9 +189,12 @@ class AttackWEP(Attack):
Color.pl('\n{!} restarting {C}aireplay{W} after' +
' {C}%d{W} seconds of no new IVs'
% stale_seconds)
Color.pl("\naireplay output:\n%s" % aireplay.get_output())
aireplay = Aireplay(self.target, \
wep_attack_type, \
client_mac=client_mac)
client_mac=client_mac, \
devnull=True,
replay_file=replay_file)
time_unchanged_ivs = time.time()
previous_ivs = airodump_target.ivs