Kismet Wireless

Kismet Forums


Posted by:dragorn
Subject:WPS flaw identified
Date:04:35:27 10/01/2012

> I'll email you a couple of pcaps of a reaver attack session, one from the attacking machine, and one from a machine running kismet, locked on the channel of the AP.
> Basically, check for association followed by eapol packets, followed by dissassociation. But the pcaps should show you what you need.

Thanks. Yeah, I just want to make sure the fingerprints I'm making are actually common, and that different vendors aren't throwing difference nonsense in there.

Reply to this message