Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Password Doesnt Show for Wired Attacks #17

Open
p3nt4 opened this issue Jun 6, 2017 · 2 comments
Open

Password Doesnt Show for Wired Attacks #17

p3nt4 opened this issue Jun 6, 2017 · 2 comments

Comments

@p3nt4
Copy link

p3nt4 commented Jun 6, 2017

Hi,
I have used this tool successfully for wireless attacks before. I am now trying to use this tool for a wired rogue PEAP attack.

I can see the client connecting: vendor=0 method=1. But when I input a password in the client, the hash doesnt appear in the rogue server.

Any idea how to fix this?

Thanks

@minanagehsalalma
Copy link

@p3nt4 hi bro it the hash can be easily cracked rather than wpa-wpa2 ?1!

@W00t3k
Copy link

W00t3k commented Jul 28, 2018

If it's a Macbook it may be your EAP type, if it's Windows 10 and you're using a self signed cert it simply won't connect without modifying the registry (OR GPO Policies). Lots of factors may restrict you connecting to a certain type of network or performing a "rogue attack". It's based on the end device's supplicant support, so an iOS or Mac OS device is going to use different EAP types by default differently. While Windows doesn't even have EAP-GTC or EAP-TTLS support built into the OS for wireless connectivity.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants