View Single Post
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#831
Originally Posted by lucas777 View Post
Does this look right? the ssid under where it says station is that thw clients ssid? i ran the deauth but it doesnt seem to kick them?

Where am i going wrong?
It looks right, there is a lot of info off-screen that will help. At the bottom of the deauth xterm screen you see the stats with the ACKs showing 6|38. That means you have kicked them and they got back on. If you reduce the font (use the volume rocker) you will see these at each attempt to kick them and the successful ones will have some numbers other than zero. Deauth is not supposed to disconnect them completely, just force them to auto re-negotiate the connection, which is what the deauth attack relies on for collecting handshakes. The client may not appear disconnected, but would not be able to transfer any useful data over the link, because it is busy re-negotiating the link.

"BSSID" is the AP and "Station" is the client.

To check whether you have a handshake, run the decrypt function with a dictionary, the xterm screen that opens will say whether there is a handshake in the data.
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)

Last edited by StefanL; 2011-06-15 at 16:08.
 

The Following User Says Thank You to StefanL For This Useful Post: