#1: AccessPoint 00:24:xx:xx:xx:xx ('xxxxxxxx')
#0: Station 01:00:xx:xx:xx:xx
#1: Station 94:0c:xx:xx:xx:xx
#2: Station 94:0c:xx:xx:xx:xx, handshake found
#3: Station 01:00:xx:xx:xx:xx
#4: Station 01:00:xx:xx:xx:xx
#5: Station 01:00:xx:xx:xx:xx
Maybe a bug in the way this version of aircrack handles handshake packets when several clients?
Aircrack-ng 1.1
[00:04:17] 272244 keys tested (1083.04 k/s)
KEY FOUND! [ password ]
--- cowpatty check:
cowpatty 4.6 - WPA-PSK dictionary attack.
...
Collected all necessary data to mount crack against WPA2/PSK passphrase.
--- pyrit check:
Pyrit 0.3.1-dev (svn r228) (C) 2008-2010 Lukas Lueg .
....
Parsing file 'psk_new-01.cap' (1/1)...
1111 packets (1111 802.11-packets), 1 APs
#1: AccessPoint 00:24:xx:xx:xx:xx ('xxxxxxxx')
#0: Station 01:00:xx:xx:xx:xx
#1: Station 94:0c:xx:xx:xx:xx
#2: Station 94:0c:xx:xx:xx:xx, handshake found
#3: Station 01:00:xx:xx:xx:xx
#4: Station 01:00:xx:xx:xx:xx
#5: Station 01:00:xx:xx:xx:xx
Maybe a bug in the way this version of aircrack handles handshake packets when several clients?