Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Networks named πŸ’₯πŸ–₯πŸ’₯ β“…βžƒβ“Œβ“ƒπŸ…ŸβΆ #49

Open
Legendaire opened this issue May 5, 2019 · 12 comments

Comments

@Legendaire
Copy link

πŸ’₯πŸ–₯πŸ’₯ β“…βžƒβ“Œβ“ƒπŸ…ŸβΆ is the name of a network in my area. I was curious to see how the special characters affected these tools. I get this message
tricky-02.cap: Oversized packet detected Networks detected: 0
when doing
cap2hccapx.exe tricky-02.cap tricky-02.hccapx
on a cap file without a handshake.

I tried the 1.9 version on a file where I am certain there was a handshake and simply got this:
Networks detected: 0
I know that airodump captured the handshake. Could this be an issue with the odd characters of the ssid or am I missing something?

@ZerBea
Copy link
Contributor

ZerBea commented May 24, 2019

β€ŽCould you please attach the capfile?
aircrack-ng handshake detection is known as buggy:
aircrack-ng/aircrack-ng#1993

@Legendaire
Copy link
Author

Legendaire commented May 26, 2019 via email

@ZerBea
Copy link
Contributor

ZerBea commented May 26, 2019

You have a filename: tricky-02.cap. So you can search it by name.

@Legendaire
Copy link
Author

Legendaire commented May 27, 2019 via email

@ZerBea
Copy link
Contributor

ZerBea commented May 27, 2019

Hmmm, why google? That will not work.
To attach a file a compressed cap file, drag and drop it into the comment box here on git.
https://help.github.com/en/articles/file-attachments-on-issues-and-pull-requests

@Legendaire
Copy link
Author

tricky-02.zip
I didn't realize our conversation was going into this thread. I was just replying via email. I've dragged and dropped the file here. I hope it helps.

@ZerBea
Copy link
Contributor

ZerBea commented May 27, 2019

Ok, that worked. Thanks.

Looks like the AP use emojis within ESSID. That is a new trend:
https://medium.com/@bcjordan/emojify-your-wi-fi-c01f4ac0b0ab
Unfortunately some clients doesn't understand this:
https://www.reddit.com/r/Ubiquiti/comments/7hfusd/using_emoji_characters_in_ssid/

hashcat (hashcat-utils), john (latest) and wpa-sec are able to handle emojis inside an ESSID.

Unfortunately, your capfile doesn't contain a PMKID or a handshake. It also doesn't contain an oversized packet. There is nothing to analyze or to hunt for an issue inside.
So, cap2hccapx is doing its job as expected:
$ cap2hccapx.bin tricky-02.cap tricky-02.hccapx
Networks detected: 0

hcxpcaptool will give us more information about the file:
$ hcxpcaptool -V tricky-02.cap
reading from tricky-02.cap
summary:
file name....................: tricky-02.cap
file type....................: pcap 2.4
file hardware information....: unknown
file os information..........: unknown
file application information.: unknown
network type.................: DLT_IEEE802_11 (105)
endianness...................: little endian
read errors..................: flawless
packets inside...............: 24304
skipped packets..............: 0
packets with GPS data........: 0
packets with FCS.............: 0
beacons (with ESSID inside)..: 1
probe responses..............: 24303

@Legendaire
Copy link
Author

Legendaire commented May 27, 2019 via email

@ZerBea
Copy link
Contributor

ZerBea commented May 28, 2019

same result, running wpapcap2john:
$ wpapcap2john tricky-02.cap
File tricky-02.cap: raw 802.11
1 ESSIDS processed and 0 AP/STA pairs processed
0 handshakes written, 0 RSN IE PMKIDs

BTW:
tricky-02.cap doesn't look like an aircrack-ng captured file
too much kismet stuff inside the zip file.
also it looks like the interface wasn't set properly to monitor mode (only beacons and proberesponses inside)

@ZerBea
Copy link
Contributor

ZerBea commented May 28, 2019

Just compiled aircrack-ng and it is working like expected, too:

$ ./aircrack-ng tricky-02.cap -w testlist
Reading packets, please wait...
Opening tricky-02.cap
Read 24304 packets.
BSSID ESSID Encryption
1 B8:27:EB:36:CE:53 πŸ’₯πŸ–₯πŸ’₯ β“…βžƒβ“Œβ“ƒπŸ…ŸβΆ Unknown
Choosing first network as target.
Reading packets, please wait...
Opening tricky-02.cap
Read 24304 packets.
1 potential targets
Packets contained no EAPOL data; unable to process this AP.
Quitting aircrack-ng...

Is driver installed in the correct way?
https://rioasmara.com/2018/09/15/alfa-awus1900-kali-linux-experience/

@Legendaire
Copy link
Author

Legendaire commented May 29, 2019 via email

@careyjames
Copy link

that is a raspberry pi zero w running P4wnP1 aloa

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants