Added --nodeauths command, try to fix WEP replay attacks.

Aireplay can optionally NOT store the process output (via `devnull=False`).
By-default, Aireplay attacks will not capture aireplay-ng output, to
avoid deadlock when overloading the OS buffer (see #21).
This commit is contained in:
derv82
2017-05-15 20:36:04 -04:00
parent a8d16d1b69
commit a226cdb9a1
8 changed files with 39 additions and 22 deletions

View File

@@ -34,6 +34,7 @@ class AttackWPA(Attack):
# First, start Airodump process
with Airodump(channel=self.target.channel,
target_bssid=self.target.bssid,
skip_wash=True,
output_file_prefix='wpa') as airodump:
Color.clear_entire_line()
@@ -216,7 +217,8 @@ class AttackWPA(Attack):
station_bssid - Client BSSID to deauth
Deauths 'broadcast' if no client is specified.
'''
# TODO: Print that we are deauthing and who we are deauthing!
if Configuration.no_deauth: return
target_name = station_bssid
if target_name == None:
target_name = 'broadcast'