• B правой части каждого сообщения есть стрелки и . Не стесняйтесь оценивать ответы. Чтобы автору вопроса закрыть свой тикет, надо выбрать лучший ответ. Просто нажмите значок в правой части сообщения.

  • Курсы Академии Кодебай, стартующие в мае - июне, от команды The Codeby

    1. Цифровая криминалистика и реагирование на инциденты
    2. ОС Linux (DFIR) Старт: 16 мая
    3. Анализ фишинговых атак Старт: 16 мая Устройства для тестирования на проникновение Старт: 16 мая

    Скидки до 10%

    Полный список ближайших курсов ...

Не проходит атака Pixie dust Bully Ralink 3070 Ralink 5370 Kali 2020

gremys

New member
07.10.2019
1
0
BIT
0
Kali 2020.2
Airgeddon - не работает
Wifite - не работает
Bully - не работает

не проходит pixiedust bully, есть два адаптера на чипах ralink 3070 и 5370, в kali 2019 всё работало, атака запускается но к результату не приводит, при этом через wi-fi autopwner, reaver с pixiedust берет сразу

Distributor ID: Kali
Description: Kali GNU/Linux Rolling
Release: 2020.2
Codename: kali-rolling
5.6.0-kali2-amd64


sudo aireplay-ng --test wlan0
ioctl(SIOCSIWMODE) failed: Device or resource busy
14:07:41 Trying broadcast probe requests...
14:07:41 Injection is working!
14:07:43 Found 6 APs
.
sudo bully -d -C -b AC:84:C6:5A:E0:16 wlan0
[!] Bully v1.1 - WPS vulnerability assessment utility
[P] Modified for pixiewps by AAnarchYY(aanarchyy@gmail.com)
[X] Unknown frequency '-1113135872' reported by interface 'wlan0'
[!] Using '66:33:96:df:b8:dd' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from 'ac:84:c6:5a:e0:16' on channel 'unknown'
[+] Switching interface 'wlan0' to channel '1'
[+] Switching interface 'wlan0' to channel '5'
[+] Switching interface 'wlan0' to channel '9'
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[+] Switching interface 'wlan0' to channel '13'
[!] Excessive (3) FCS failures while reading next packet
[!] Disabling FCS validation (assuming --nofcs)
[+] Got beacon for 'TP-Link_E016' (ac:84:c6:5a:e0:16)
[+] Switching interface 'wlan0' to channel '3'
[+] Loading randomized pins from '/root/.bully/pins'
[!] Restoring session from '/root/.bully/ac84c65ae016.run'
[+] Index of starting pin number is '0000000'
[+] Last State = 'NoAssoc' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[!] Received disassociation/deauthentication from the AP
[+] Rx( Assn ) = 'NoAssoc' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[+] Rx( M1 ) = 'Timeout' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( ID ) = 'EAPFail' Next pin '05820917'
[!] Received disassociation/deauthentication from the AP
[+] Tx(DeAuth) = 'NoAssoc' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[+] Rx( Assn ) = 'Timeout' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[!] Unexpected packet received when waiting for EAP Req Id
[!] >000012002e48000000027609a000eb010000080a3a01663396dfb8ddac84c65ae016ac84c65ae0162000aaaa03000000888e0100008a01ca008afe00372a000000010400104a000110102200010710390010a53155946d3804da9ac9e7b0ab52d3a810140020d9d6f47b22c3d1867218473cf8632647ef8a1fbc73a525616da4003872ca8a01101500204a69065b961f70ee9f4b569a9f1deac79f85af35cc19c65fd6914d77269a9af41049000600372a0001201005000899dc9829c17db280<
[+] Rx( ID ) = 'EAPFail' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[+] Rx( Assn ) = 'Timeout' Next pin '05820917'
[+] Rx( M1 ) = 'Timeout' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[+] Rx( Assn ) = 'Timeout' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[+] Rx( Assn ) = 'Timeout' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[+] Sent packet not acknowledged after 3 attempts
[+] Tx( Strt ) = 'Timeout' Next pin '05820917'
[P] ENonce received.
[P] PKE received.
[P] RNonce received.
[P] PKR received.
[P] Authkey received.
[!] Received M2D or out of sequence WPS Message
[+] Rx(M2D/M3) = 'WPSFail' Next pin '05820917'
[+] Rx( Auth ) = 'Timeout' Next pin '05820917'
[!] Unexpected packet received when waiting for EAP Req Id
[!] >000012002e48000000027609a000f1010000080a3a01663396dfb8ddac84c65ae016ac84c65ae0169000aaaa03000000888e0100008a0130008afe00372a000000010400104a000110102200010710390010c7a4bb2a13757c2614ce7eed782c390e10140020699f4f56b12905f5fad295b0aee73af988f4bc2a9ac3abc9a8e1e5ba949697eb101500204db0a5ac0a84df971a286125238d49016b875ed791ce856ab5aa6ae8b801cea31049000600372a00012010050008c498502697c97072<
 
Последнее редактирование:
Мы в соцсетях:

Обучение наступательной кибербезопасности в игровой форме. Начать игру!