You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using any Deauting method within the fluxion script, it either struggles really hard and barely makes it or it just flat out fails to deauth devices in the network. The console will show that a deauth is in progress but all devices remain operational.
This however is not the case when I use aireplay manually.
What is the current behaviour?
The script manages to deauth devices after a very long time and not consistently when using the "Capture Handshake" attack.
It does not at all deauth devices while using the evil twin attack.
Even if I specify that a second, separate adapter should do the target tracking and deauth.
How to reproduce
If the current behaviour is a bug, please provide the steps to reproduce it.
I've used VMware & VirtualBox to connect the following Wifi adapter chipsets to the VM:
AR9271
MT7610U
RT5572
All of these devices support monitor and AP mode according to the airgeddon github page
Then I started the script normally, installed all the dependencies (via the parameter -i) and started the attacks. Handshake deauth works somewhat but evil twin attack deauth doesn't work... even with a second adapter as the deauth.
Only way I can get it to work is to let one adapter get used by fluxion and use another one to deauth the devices manually.....
Tested with: Kali 2024.3, Kali 2022.4 with all updates.
VirtualBox: v7.1.4
VmWare Pro: v17.6.1
What do you think the expected behaviour should be?
It should start deauthing all devices from the target network and host the AP on the same Adapter. Or at least deauth with one adapter and host the twin network on a second one.
But the deauth should work.
Specs
#### FLUXION Info
FLUXION V6.12
#### BASH Info
GNU bash, version 5.2.32(1)-release (x86_64-pc-linux-gnu)
Copyright (C) 2022 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
**Path:** /usr/bin/bash
#### Interface (wlan0) Info
**Device**: phy0
**Driver:** ath9k_htc
**Chipset:** Qualcomm Atheros Communications AR9271 802.11n
**Master Modes** Yes
**Injection Test:** Injection is working!
#### XTerm Infos
**Version:** XTerm(395)
**Path:** /usr/bin/xterm
Test: XServer/XTerm success!
#### HostAPD Info
hostapd v2.10
User space daemon for IEEE 802.11 AP management,
IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Copyright (c) 2002-2022, Jouni Malinen <[email protected]> and contributors
Path: /usr/sbin/hostapd
#### Aircrack-ng Info
Aircrack-ng 1.7 - (C) 2006-2022 Thomas d'Otreppe
https://www.aircrack-ng.org
#### Pyrit Info
Traceback (most recent call last):
File "<string>", line 1, in <module>
ImportError: No module named scapy
./diagnostics.sh: line 89: pyrit: command not found
**Scapy Version:**
Warning: Pyrit has been reported to be incompatible with scapy version 2.4.0 and above. Consult the wiki for further information. This should not affect you, if you don't choose to use pyrit in the script.
#### System Info
**Chipset:** Linux version 6.11.2-amd64 ([email protected]) (x86_64-linux-gnu-gcc-14 (Debian 14.2.0-6) 14.2.0, GNU ld (GNU Binutils for Debian) 2.43.1) #1 SMP PREEMPT_DYNAMIC Kali 6.11.2-1kali1 (2024-10-15)
#### Chipset
Chipset: ath9k_htc
Chipset support ap mode
Chipset support monitor mode
Don't reseve all required information
##########################################################################################################################
#### FLUXION Info
FLUXION V6.12
#### BASH Info
GNU bash, version 5.2.32(1)-release (x86_64-pc-linux-gnu)
Copyright (C) 2022 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
**Path:** /usr/bin/bash
#### Interface (wlan1) Info
**Device**: phy1
**Driver:** mt76x0u
**Chipset:** Ralink Technology, Corp. MT7610U ("Archer T2U" 2.4G+5G WLAN Adapter
**Master Modes** Yes
**Injection Test:** Injection is working!
#### XTerm Infos
**Version:** XTerm(395)
**Path:** /usr/bin/xterm
Test: XServer/XTerm success!
#### HostAPD Info
hostapd v2.10
User space daemon for IEEE 802.11 AP management,
IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Copyright (c) 2002-2022, Jouni Malinen <[email protected]> and contributors
Path: /usr/sbin/hostapd
#### Aircrack-ng Info
Aircrack-ng 1.7 - (C) 2006-2022 Thomas d'Otreppe
https://www.aircrack-ng.org
#### Pyrit Info
Traceback (most recent call last):
File "<string>", line 1, in <module>
ImportError: No module named scapy
./diagnostics.sh: line 89: pyrit: command not found
**Scapy Version:**
Warning: Pyrit has been reported to be incompatible with scapy version 2.4.0 and above. Consult the wiki for further information. This should not affect you, if you don't choose to use pyrit in the script.
#### System Info
**Chipset:** Linux version 6.11.2-amd64 ([email protected]) (x86_64-linux-gnu-gcc-14 (Debian 14.2.0-6) 14.2.0, GNU ld (GNU Binutils for Debian) 2.43.1) #1 SMP PREEMPT_DYNAMIC Kali 6.11.2-1kali1 (2024-10-15)
#### Chipset
Chipset: mt76x0u
Chipset is not in list
#########################################################################################################################################################################################
#### FLUXION Info
FLUXION V6.12
#### BASH Info
GNU bash, version 5.2.32(1)-release (x86_64-pc-linux-gnu)
Copyright (C) 2022 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
**Path:** /usr/bin/bash
#### Interface (wlan0) Info
**Device**: phy0
**Driver:** rt2800usb
**Chipset:** Ralink Technology, Corp. RT5572
**Master Modes** Yes
**Injection Test:** Injection is working!
#### XTerm Infos
**Version:** XTerm(395)
**Path:** /usr/bin/xterm
Test: XServer/XTerm success!
#### HostAPD Info
hostapd v2.10
User space daemon for IEEE 802.11 AP management,
IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Copyright (c) 2002-2022, Jouni Malinen <[email protected]> and contributors
Path: /usr/sbin/hostapd
#### Aircrack-ng Info
Aircrack-ng 1.7 - (C) 2006-2022 Thomas d'Otreppe
https://www.aircrack-ng.org
#### Pyrit Info
Traceback (most recent call last):
File "<string>", line 1, in <module>
ImportError: No module named scapy
./diagnostics.sh: line 89: pyrit: command not found
**Scapy Version:**
Warning: Pyrit has been reported to be incompatible with scapy version 2.4.0 and above. Consult the wiki for further information. This should not affect you, if you don't choose to use pyrit in the script.
#### System Info
**Chipset:** Linux version 6.11.2-amd64 ([email protected]) (x86_64-linux-gnu-gcc-14 (Debian 14.2.0-6) 14.2.0, GNU ld (GNU Binutils for Debian) 2.43.1) #1 SMP PREEMPT_DYNAMIC Kali 6.11.2-1kali1 (2024-10-15)
#### Chipset
Chipset: rt2800usb
Chipset support ap mode
Chipset support monitor mode
Don't reseve all required information
Additional Info
I've used the older predecessor of Fluxion - Linset - around 2014 and can say it worked well with the AR9271 Adapter. So just to test that my adapter isn't somehow bugged I started an old VM with linset installed and was able to start the attack including deauthing all devices on the target network instantly.
So it can't be an Adapter issue.
If any more information is needed, I'm happy to provide it!
The text was updated successfully, but these errors were encountered:
Bug Report
Summary
When using any Deauting method within the fluxion script, it either struggles really hard and barely makes it or it just flat out fails to deauth devices in the network. The console will show that a deauth is in progress but all devices remain operational.
This however is not the case when I use aireplay manually.
What is the current behaviour?
The script manages to deauth devices after a very long time and not consistently when using the "Capture Handshake" attack.
It does not at all deauth devices while using the evil twin attack.
Even if I specify that a second, separate adapter should do the target tracking and deauth.
How to reproduce
If the current behaviour is a bug, please provide the steps to reproduce it.
I've used VMware & VirtualBox to connect the following Wifi adapter chipsets to the VM:
All of these devices support monitor and AP mode according to the airgeddon github page
Then I started the script normally, installed all the dependencies (via the parameter -i) and started the attacks. Handshake deauth works somewhat but evil twin attack deauth doesn't work... even with a second adapter as the deauth.
Only way I can get it to work is to let one adapter get used by fluxion and use another one to deauth the devices manually.....
Tested with: Kali 2024.3, Kali 2022.4 with all updates.
VirtualBox: v7.1.4
VmWare Pro: v17.6.1
What do you think the expected behaviour should be?
It should start deauthing all devices from the target network and host the AP on the same Adapter. Or at least deauth with one adapter and host the twin network on a second one.
But the deauth should work.
Specs
Additional Info
I've used the older predecessor of Fluxion - Linset - around 2014 and can say it worked well with the AR9271 Adapter. So just to test that my adapter isn't somehow bugged I started an old VM with linset installed and was able to start the attack including deauthing all devices on the target network instantly.
So it can't be an Adapter issue.
If any more information is needed, I'm happy to provide it!
The text was updated successfully, but these errors were encountered: