Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deauth not working properly #1208

Open
ob45 opened this issue Dec 10, 2024 · 0 comments
Open

Deauth not working properly #1208

ob45 opened this issue Dec 10, 2024 · 0 comments

Comments

@ob45
Copy link

ob45 commented Dec 10, 2024

Bug Report

Summary

When using any Deauting method within the fluxion script, it either struggles really hard and barely makes it or it just flat out fails to deauth devices in the network. The console will show that a deauth is in progress but all devices remain operational.
This however is not the case when I use aireplay manually.

What is the current behaviour?

The script manages to deauth devices after a very long time and not consistently when using the "Capture Handshake" attack.
It does not at all deauth devices while using the evil twin attack.
Even if I specify that a second, separate adapter should do the target tracking and deauth.

How to reproduce

If the current behaviour is a bug, please provide the steps to reproduce it.

I've used VMware & VirtualBox to connect the following Wifi adapter chipsets to the VM:

  • AR9271
  • MT7610U
  • RT5572

All of these devices support monitor and AP mode according to the airgeddon github page

Then I started the script normally, installed all the dependencies (via the parameter -i) and started the attacks. Handshake deauth works somewhat but evil twin attack deauth doesn't work... even with a second adapter as the deauth.

Only way I can get it to work is to let one adapter get used by fluxion and use another one to deauth the devices manually.....

Tested with: Kali 2024.3, Kali 2022.4 with all updates.
VirtualBox: v7.1.4
VmWare Pro: v17.6.1

What do you think the expected behaviour should be?

It should start deauthing all devices from the target network and host the AP on the same Adapter. Or at least deauth with one adapter and host the twin network on a second one.

But the deauth should work.

Specs
#### FLUXION Info
FLUXION V6.12


#### BASH Info 
GNU bash, version 5.2.32(1)-release (x86_64-pc-linux-gnu)
Copyright (C) 2022 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>

This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
**Path:** /usr/bin/bash


#### Interface (wlan0) Info 
**Device**: phy0
**Driver:** ath9k_htc
**Chipset:** Qualcomm Atheros Communications AR9271 802.11n
**Master Modes** Yes
**Injection Test:** Injection is working!


#### XTerm Infos
**Version:** XTerm(395)
**Path:** /usr/bin/xterm
Test: XServer/XTerm success!


#### HostAPD Info
hostapd v2.10
User space daemon for IEEE 802.11 AP management,
IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Copyright (c) 2002-2022, Jouni Malinen <[email protected]> and contributors
Path: /usr/sbin/hostapd


#### Aircrack-ng Info

  Aircrack-ng 1.7  - (C) 2006-2022 Thomas d'Otreppe
  https://www.aircrack-ng.org


#### Pyrit Info
Traceback (most recent call last):
  File "<string>", line 1, in <module>
ImportError: No module named scapy
./diagnostics.sh: line 89: pyrit: command not found
**Scapy Version:** 
Warning: Pyrit has been reported to be incompatible with scapy version 2.4.0 and above. Consult the wiki for further information. This should not affect you, if you don't choose to use pyrit in the script.                                                                                                                             

#### System Info
**Chipset:** Linux version 6.11.2-amd64 ([email protected]) (x86_64-linux-gnu-gcc-14 (Debian 14.2.0-6) 14.2.0, GNU ld (GNU Binutils for Debian) 2.43.1) #1 SMP PREEMPT_DYNAMIC Kali 6.11.2-1kali1 (2024-10-15)

#### Chipset
Chipset: ath9k_htc
Chipset support ap mode
Chipset support monitor mode
Don't reseve all required information


##########################################################################################################################


#### FLUXION Info
FLUXION V6.12


#### BASH Info 
GNU bash, version 5.2.32(1)-release (x86_64-pc-linux-gnu)
Copyright (C) 2022 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>

This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
**Path:** /usr/bin/bash


#### Interface (wlan1) Info 
**Device**: phy1
**Driver:** mt76x0u
**Chipset:** Ralink Technology, Corp. MT7610U ("Archer T2U" 2.4G+5G WLAN Adapter
**Master Modes** Yes
**Injection Test:** Injection is working!


#### XTerm Infos
**Version:** XTerm(395)
**Path:** /usr/bin/xterm
Test: XServer/XTerm success!


#### HostAPD Info
hostapd v2.10
User space daemon for IEEE 802.11 AP management,
IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Copyright (c) 2002-2022, Jouni Malinen <[email protected]> and contributors
Path: /usr/sbin/hostapd


#### Aircrack-ng Info

  Aircrack-ng 1.7  - (C) 2006-2022 Thomas d'Otreppe
  https://www.aircrack-ng.org


#### Pyrit Info
Traceback (most recent call last):
  File "<string>", line 1, in <module>
ImportError: No module named scapy
./diagnostics.sh: line 89: pyrit: command not found
**Scapy Version:** 
Warning: Pyrit has been reported to be incompatible with scapy version 2.4.0 and above. Consult the wiki for further information. This should not affect you, if you don't choose to use pyrit in the script.                                                                                                                             

#### System Info
**Chipset:** Linux version 6.11.2-amd64 ([email protected]) (x86_64-linux-gnu-gcc-14 (Debian 14.2.0-6) 14.2.0, GNU ld (GNU Binutils for Debian) 2.43.1) #1 SMP PREEMPT_DYNAMIC Kali 6.11.2-1kali1 (2024-10-15)

#### Chipset
Chipset: mt76x0u
Chipset is not in list


#########################################################################################################################################################################################

#### FLUXION Info
FLUXION V6.12


#### BASH Info 
GNU bash, version 5.2.32(1)-release (x86_64-pc-linux-gnu)
Copyright (C) 2022 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>

This is free software; you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
**Path:** /usr/bin/bash


#### Interface (wlan0) Info 
**Device**: phy0
**Driver:** rt2800usb
**Chipset:** Ralink Technology, Corp. RT5572
**Master Modes** Yes
**Injection Test:** Injection is working!


#### XTerm Infos
**Version:** XTerm(395)
**Path:** /usr/bin/xterm
Test: XServer/XTerm success!


#### HostAPD Info
hostapd v2.10
User space daemon for IEEE 802.11 AP management,
IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
Copyright (c) 2002-2022, Jouni Malinen <[email protected]> and contributors
Path: /usr/sbin/hostapd


#### Aircrack-ng Info

  Aircrack-ng 1.7  - (C) 2006-2022 Thomas d'Otreppe
  https://www.aircrack-ng.org


#### Pyrit Info
Traceback (most recent call last):
  File "<string>", line 1, in <module>
ImportError: No module named scapy
./diagnostics.sh: line 89: pyrit: command not found
**Scapy Version:** 
Warning: Pyrit has been reported to be incompatible with scapy version 2.4.0 and above. Consult the wiki for further information. This should not affect you, if you don't choose to use pyrit in the script.                                                                                                                           

#### System Info
**Chipset:** Linux version 6.11.2-amd64 ([email protected]) (x86_64-linux-gnu-gcc-14 (Debian 14.2.0-6) 14.2.0, GNU ld (GNU Binutils for Debian) 2.43.1) #1 SMP PREEMPT_DYNAMIC Kali 6.11.2-1kali1 (2024-10-15)

#### Chipset
Chipset: rt2800usb
Chipset support ap mode
Chipset support monitor mode
Don't reseve all required information

Additional Info

I've used the older predecessor of Fluxion - Linset - around 2014 and can say it worked well with the AR9271 Adapter. So just to test that my adapter isn't somehow bugged I started an old VM with linset installed and was able to start the attack including deauthing all devices on the target network instantly.

So it can't be an Adapter issue.

If any more information is needed, I'm happy to provide it!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant