Bugfix: Don't infinitely loop while calculating Hex & ASCII key from WEP attack.

* Simplified HEX/ASCII conversion. Avoids infinite loop 🤔
* Added integration test: python -m wifite.tools.aircrack

Should resolve "hanging" issues during WEP attacks such as #27.
This commit is contained in:
derv82
2018-03-24 13:59:58 -04:00
parent 34d6b69b48
commit a488cf86f1
2 changed files with 47 additions and 40 deletions

View File

@@ -94,12 +94,7 @@ class AttackWEP(Attack):
if aireplay.status is not None:
status += ", %s" % aireplay.status
Color.clear_entire_line()
Color.pattack("WEP",
airodump_target,
"%s" % attack_name,
status)
#self.aircrack_check()
Color.pattack("WEP", airodump_target, "%s" % attack_name, status)
# Check if we cracked it.
if aircrack and aircrack.is_cracked():
@@ -109,8 +104,7 @@ class AttackWEP(Attack):
essid = airodump_target.essid
else:
essid = None
Color.pl('\n{+} {C}%s{W} WEP attack {G}successful{W}\n'
% attack_name)
Color.pl('\n{+} {C}%s{W} WEP attack {G}successful{W}\n' % attack_name)
if aireplay: aireplay.stop()
if fakeauth_proc: fakeauth_proc.stop()
self.crack_result = CrackResultWEP(self.target.bssid,
@@ -143,9 +137,7 @@ class AttackWEP(Attack):
# Restart aircrack after X seconds
aircrack.stop()
ivs_file = airodump.find_files(endswith='.ivs')[0]
Color.pl('\n{+} {C}aircrack{W} ran for more than' +
' {C}%d{W} seconds, restarting'
% Configuration.wep_restart_aircrack)
Color.pl('\n{+} {C}aircrack{W} ran for more than {C}%d{W} seconds, restarting' % Configuration.wep_restart_aircrack)
aircrack = Aircrack(ivs_file)