Skip to content

wifi.deauth.aquired does not work #889

@dennis777

Description

@dennis777

Environment

Bettercap version: v2.31.1
OS: Kali Linux
Args: bettercap (-debug) -iface wlan1
Code run in interface:

wifi.recon on; set wifi.deauth.aquired true; set wifi.show.manufacturer true
set ticker.commands "wifi.deauth BSSID"; ticker on

Debug output:

wlan1  » [06:19:13] [sys.log] [dbg] arp.spoof arp cache restoration after spoofing enabled
wlan1  » [06:19:13] [sys.log] [dbg] Could not find mac for 
[06:19:49] [sys.log] [dbg] SetInterfaceTxPower(wlan1, 30) iw based
[06:19:49] [sys.log] [dbg] wifi new frequencies: [2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484]
[06:19:49] [sys.log] [dbg] wifi wifi supported frequencies: [2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484]
wlan1  » [06:19:49] [sys.log] [dbg] wifi wifi stations pruner started (ap.ttl:5m0s sta.ttl:5m0s).
wlan1  » [05:55:32] [sys.log] [dbg] wifi got frame 1/4 of the [BSSID] <-> [Client BSSID] handshake (without PMKID)
wlan1  » [05:55:32] [sys.log] [dbg] wifi adding beacon frame to handshake for [BSSID]
wlan1  » [05:55:32] [sys.log] [dbg] wifi (aggregate true) saving handshake frames to /root/bettercap-wifi-handshakes.pcap
wlan1  » [06:19:49] [sys.log] [dbg] wifi wifi stations pruner started (ap.ttl:5m0s sta.ttl:5m0s).
wlan1  » [05:55:32] [wifi.client.handshake] captured [Client BSSID] -> [SSID] (BSSID) WPA2 handshake (half) to /root/bettercap-wifi-handshakes.pcap
wlan1  » [05:55:32] [sys.log] [dbg] wifi saving extra DataQOSData frame (173 bytes) for [Client BSSID] (Client Manufacturer)
wlan1  » [05:55:32] [sys.log] [dbg] wifi (aggregate true) saving handshake frames to /root/bettercap-wifi-handshakes.pcap
wlan1  » [05:55:32] [sys.log] [dbg] wifi got frame 2/4 of the [BSSID] <-> [Client BSSID] handshake
wlan1  » [05:55:46] [sys.log] [dbg] wifi skipping deauth for AP [SSID] (key material already acquired)
wlan1  » [05:55:46] [sys.log] [dbg] wifi skipping deauth for AP [SSID] (key material already acquired)
...

Steps to Reproduce

  1. Launch Bettercap bettercap -iface wlan1
  2. Run the commands once inside the interface (see commands above)

Expected behavior:
Bettercap will continue to deauth the listed Client BSSID even if bettercap has already collected a handshake for the clients AP

Actual behavior:
Bettercap deauths targets until handshake is captured and then bettercap skips deauthing Client because it has already captured the handshake for the clients AP. In essence, it ignores the set wifi.deauth.aquired true and will skip deauthing clients and APs regardless what wifi.deauth.aquired it is set to.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions