Advertisement
Guest User

Untitled

a guest
Mar 20th, 2011
159
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.49 KB | None | 0 0
  1. [jayd3e@SOLID Scripts]$ sudo wpa_supplicant -Dwext -ira0 -c/etc/wpa_supplicant.conf -dd
  2. Initializing interface 'ra0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
  3. Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
  4. Reading configuration file '/etc/wpa_supplicant.conf'
  5. ctrl_interface='/var/run/wpa_supplicant'
  6. ctrl_interface_group='network'
  7. Line: 3 - start of a new network block
  8. ssid - hexdump_ascii(len=21):
  9. 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 AFK - Fucking Bi
  10. 74 63 68 65 73 tches
  11. scan_ssid=1 (0x1)
  12. key_mgmt: 0x2
  13. PSK - hexdump(len=32): [REMOVED]
  14. Priority group 0
  15. id=0 ssid='AFK - Fucking Bitches'
  16. SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf
  17. capabilities: key_mgmt 0xf enc 0xf flags 0x0
  18. netlink: Operstate: linkmode=1, operstate=5
  19. Own MAC address: 68:7f:74:89:a6:3e
  20. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  21. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  22. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  23. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  24. wpa_driver_wext_set_countermeasures
  25. RSN: flushing PMKID list in the driver
  26. Setting scan request: 0 sec 100000 usec
  27. WPS: UUID based on MAC address - hexdump(len=16): 8d 4b 27 41 88 5b 5c 36 b2 2e 45 cf 47 ec d9 b2
  28. EAPOL: SUPP_PAE entering state DISCONNECTED
  29. EAPOL: Supplicant port status: Unauthorized
  30. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  31. EAPOL: SUPP_BE entering state INITIALIZE
  32. EAP: EAP entering state DISABLED
  33. EAPOL: Supplicant port status: Unauthorized
  34. EAPOL: Supplicant port status: Unauthorized
  35. ctrl_interface_group=90 (from group name 'network')
  36. Added interface ra0
  37. RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  38. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  39. Wireless event: cmd=0x8b06 len=8
  40. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  41. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  42. State: DISCONNECTED -> SCANNING
  43. Scan SSID - hexdump_ascii(len=21):
  44. 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 AFK - Fucking Bi
  45. 74 63 68 65 73 tches
  46. Starting AP scan for specific SSID(s)
  47. Scan requested (ret=0) - scan timeout 5 seconds
  48. EAPOL: disable timer tick
  49. EAPOL: Supplicant port status: Unauthorized
  50. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  51. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  52. Wireless event: cmd=0x8b19 len=8
  53. Received 544 bytes of scan results (3 BSSes)
  54. BSS: Start scan result update 1
  55. BSS: Add new id 0 BSSID 00:23:69:34:a7:7a SSID 'AFK - Fucking Bitches'
  56. BSS: Add new id 1 BSSID 00:1c:df:4d:1c:a6 SSID 'milk&cereal'
  57. BSS: Add new id 2 BSSID 2e:23:7d:ae:4d:a2 SSID 'hpsetup'
  58. New scan results available
  59. WPS: attr type=0x104a len=1
  60. WPS: attr type=0x1044 len=1
  61. WPS: attr type=0x1047 len=16
  62. WPS: attr type=0x103c len=1
  63. WPS: attr type=0x104a len=1
  64. WPS: attr type=0x1044 len=1
  65. WPS: attr type=0x1047 len=16
  66. WPS: attr type=0x103c len=1
  67. Selecting BSS from priority group 0
  68. Try to find WPA-enabled AP
  69. 0: 00:23:69:34:a7:7a ssid='AFK - Fucking Bitches' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  70. selected based on RSN IE
  71. selected WPA AP 00:23:69:34:a7:7a ssid='AFK - Fucking Bitches'
  72. Trying to associate with 00:23:69:34:a7:7a (SSID='AFK - Fucking Bitches' freq=2462 MHz)
  73. Cancelling scan request
  74. WPA: clearing own WPA/RSN IE
  75. Automatic auth_alg selection: 0x1
  76. RSN: using IEEE 802.11i/D9.0
  77. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  78. WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
  79. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
  80. WPA: using GTK TKIP
  81. WPA: using PTK CCMP
  82. WPA: using KEY_MGMT WPA-PSK
  83. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  84. No keys have been configured - skip key clearing
  85. State: SCANNING -> ASSOCIATING
  86. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  87. netlink: Operstate: linkmode=-1, operstate=5
  88. wpa_driver_wext_associate
  89. wpa_driver_wext_set_drop_unencrypted
  90. ioctl[SIOCSIWGENIE]: Operation not supported
  91. wpa_driver_wext_set_psk
  92. Association request to the driver failed
  93. Setting authentication timeout: 5 sec 0 usec
  94. EAPOL: External notification - EAP success=0
  95. EAPOL: Supplicant port status: Unauthorized
  96. EAPOL: External notification - EAP fail=0
  97. EAPOL: Supplicant port status: Unauthorized
  98. EAPOL: External notification - portControl=Auto
  99. EAPOL: Supplicant port status: Unauthorized
  100. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  101. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  102. Wireless event: cmd=0x8b06 len=8
  103. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  104. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  105. Wireless event: cmd=0x8b04 len=12
  106. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  107. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  108. Wireless event: cmd=0x8b1a len=29
  109. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  110. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  111. Wireless event: cmd=0x8b06 len=8
  112. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  113. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  114. Wireless event: cmd=0x8b04 len=12
  115. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  116. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  117. Wireless event: cmd=0x8b1a len=29
  118. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  119. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  120. Wireless event: cmd=0x8b06 len=8
  121. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  122. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  123. Wireless event: cmd=0x8b04 len=12
  124. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  125. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  126. Wireless event: cmd=0x8b1a len=29
  127. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  128. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  129. Wireless event: cmd=0x8b19 len=8
  130. Received 544 bytes of scan results (3 BSSes)
  131. BSS: Start scan result update 2
  132. New scan results available
  133. WPS: attr type=0x104a len=1
  134. WPS: attr type=0x1044 len=1
  135. WPS: attr type=0x1047 len=16
  136. WPS: attr type=0x103c len=1
  137. WPS: attr type=0x104a len=1
  138. WPS: attr type=0x1044 len=1
  139. WPS: attr type=0x1047 len=16
  140. WPS: attr type=0x103c len=1
  141. RSN: Ignored PMKID candidate without preauth flag
  142. Selecting BSS from priority group 0
  143. Try to find WPA-enabled AP
  144. 0: 00:23:69:34:a7:7a ssid='AFK - Fucking Bitches' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
  145. selected based on RSN IE
  146. selected WPA AP 00:23:69:34:a7:7a ssid='AFK - Fucking Bitches'
  147. Already associated with the selected AP
  148. Authentication with 00:23:69:34:a7:7a timed out.
  149. Added BSSID 00:23:69:34:a7:7a into blacklist
  150. No keys have been configured - skip key clearing
  151. State: ASSOCIATING -> DISCONNECTED
  152. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  153. netlink: Operstate: linkmode=-1, operstate=5
  154. EAPOL: External notification - portEnabled=0
  155. EAPOL: Supplicant port status: Unauthorized
  156. EAPOL: External notification - portValid=0
  157. EAPOL: Supplicant port status: Unauthorized
  158. EAPOL: External notification - EAP success=0
  159. EAPOL: Supplicant port status: Unauthorized
  160. Setting scan request: 0 sec 0 usec
  161. State: DISCONNECTED -> SCANNING
  162. Starting AP scan for wildcard SSID
  163. Scan requested (ret=0) - scan timeout 30 seconds
  164. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  165. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  166. Wireless event: cmd=0x8c07 len=63
  167. AssocReq IE wireless event - hexdump(len=55): 00 15 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 74 63 68 65 73 01 08 82 84 8b 96 12 24 48 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  168. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  169. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  170. Wireless event: cmd=0x8b15 len=20
  171. Wireless event: new AP: 00:23:69:34:a7:7a
  172. Association info event
  173. req_ies - hexdump(len=55): 00 15 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 74 63 68 65 73 01 08 82 84 8b 96 12 24 48 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  174. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  175. State: SCANNING -> ASSOCIATED
  176. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  177. netlink: Operstate: linkmode=-1, operstate=5
  178. Associated to a new BSS: BSSID=00:23:69:34:a7:7a
  179. No keys have been configured - skip key clearing
  180. Select network based on association information
  181. Network configuration found for the current AP
  182. WPA: Using WPA IE from AssocReq to set cipher suites
  183. WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
  184. WPA: clearing AP WPA IE
  185. WPA: clearing AP RSN IE
  186. WPA: using GTK TKIP
  187. WPA: using PTK CCMP
  188. WPA: using KEY_MGMT WPA-PSK
  189. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  190. EAPOL: External notification - EAP success=0
  191. EAPOL: Supplicant port status: Unauthorized
  192. EAPOL: External notification - EAP fail=0
  193. EAPOL: Supplicant port status: Unauthorized
  194. EAPOL: External notification - portControl=Auto
  195. EAPOL: Supplicant port status: Unauthorized
  196. Associated with 00:23:69:34:a7:7a
  197. WPA: Association event - clear replay counter
  198. WPA: Clear old PTK
  199. EAPOL: External notification - portEnabled=0
  200. EAPOL: Supplicant port status: Unauthorized
  201. EAPOL: External notification - portValid=0
  202. EAPOL: Supplicant port status: Unauthorized
  203. EAPOL: External notification - EAP success=0
  204. EAPOL: Supplicant port status: Unauthorized
  205. EAPOL: External notification - portEnabled=1
  206. EAPOL: SUPP_PAE entering state CONNECTING
  207. EAPOL: enable timer tick
  208. EAPOL: SUPP_BE entering state IDLE
  209. Setting authentication timeout: 10 sec 0 usec
  210. Cancelling scan request
  211. RX EAPOL from 00:23:69:34:a7:7a
  212. RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  213. Setting authentication timeout: 10 sec 0 usec
  214. IEEE 802.1X RX: version=1 type=3 length=95
  215. EAPOL-Key type=2
  216. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  217. key_length=16 key_data_length=0
  218. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  219. key_nonce - hexdump(len=32): cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc
  220. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  221. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  222. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  223. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  224. WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  225. State: ASSOCIATED -> 4WAY_HANDSHAKE
  226. WPA: RX message 1 of 4-Way Handshake from 00:23:69:34:a7:7a (ver=2)
  227. RSN: msg 1/4 key data - hexdump(len=0):
  228. WPA: Renewed SNonce - hexdump(len=32): ef 44 0a c0 c5 d5 aa 0e f8 34 10 c8 06 66 47 e2 e3 3f 16 5d 00 d0 2e e5 30 77 a2 21 39 3b 92 a2
  229. WPA: PTK derivation - A1=68:7f:74:89:a6:3e A2=00:23:69:34:a7:7a
  230. WPA: PMK - hexdump(len=32): [REMOVED]
  231. WPA: PTK - hexdump(len=48): [REMOVED]
  232. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  233. WPA: Sending EAPOL-Key 2/4
  234. WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ef 44 0a c0 c5 d5 aa 0e f8 34 10 c8 06 66 47 e2 e3 3f 16 5d 00 d0 2e e5 30 77 a2 21 39 3b 92 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e df 65 93 f3 c2 82 8b ac d7 86 22 af 4d f7 21 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  235. RX EAPOL from 00:23:69:34:a7:7a
  236. RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d7 d4 a3 71 08 69 a4 0c 70 05 28 6a 8a 67 4a 08 00 50 cc a5 df da 5b f7 61 dd 4f d3 b1 bc 0d 37 57 2b e3 cf aa 7f ef fb 7c e3 b4 46 fc 38 fb 8d 3e 96 85 03 53 20 8d 31 fa 32 1a b0 26 72 ae 1e 06 bc 3a a2 dc 2f 5a d6 18 82 2c d6 4f d4 36 bb 5a 8c bb 70 02 39 ac d9 c4 25 2f 80 06 3a 06 9f 5b b2
  237. IEEE 802.1X RX: version=1 type=3 length=175
  238. EAPOL-Key type=2
  239. key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  240. key_length=16 key_data_length=80
  241. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  242. key_nonce - hexdump(len=32): cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc
  243. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  244. key_rsc - hexdump(len=8): 62 0a 00 00 00 00 00 00
  245. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  246. key_mic - hexdump(len=16): d7 d4 a3 71 08 69 a4 0c 70 05 28 6a 8a 67 4a 08
  247. WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d7 d4 a3 71 08 69 a4 0c 70 05 28 6a 8a 67 4a 08 00 50 cc a5 df da 5b f7 61 dd 4f d3 b1 bc 0d 37 57 2b e3 cf aa 7f ef fb 7c e3 b4 46 fc 38 fb 8d 3e 96 85 03 53 20 8d 31 fa 32 1a b0 26 72 ae 1e 06 bc 3a a2 dc 2f 5a d6 18 82 2c d6 4f d4 36 bb 5a 8c bb 70 02 39 ac d9 c4 25 2f 80 06 3a 06 9f 5b b2
  248. WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
  249. WPA: Could not verify EAPOL-Key MIC - dropping packet
  250. RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  251. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  252. EAPOL: startWhen --> 0
  253. EAPOL: disable timer tick
  254. EAPOL: SUPP_PAE entering state CONNECTING
  255. EAPOL: enable timer tick
  256. EAPOL: txStart
  257. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  258. Authentication with 00:23:69:34:a7:7a timed out.
  259. BSSID 00:23:69:34:a7:7a blacklist count incremented to 2
  260. wpa_driver_wext_disassociate
  261. No keys have been configured - skip key clearing
  262. State: 4WAY_HANDSHAKE -> DISCONNECTED
  263. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  264. netlink: Operstate: linkmode=-1, operstate=5
  265. EAPOL: External notification - portEnabled=0
  266. EAPOL: SUPP_PAE entering state DISCONNECTED
  267. EAPOL: Supplicant port status: Unauthorized
  268. EAPOL: SUPP_BE entering state INITIALIZE
  269. EAPOL: Supplicant port status: Unauthorized
  270. EAPOL: External notification - portValid=0
  271. EAPOL: Supplicant port status: Unauthorized
  272. EAPOL: External notification - EAP success=0
  273. EAPOL: Supplicant port status: Unauthorized
  274. Setting scan request: 0 sec 0 usec
  275. State: DISCONNECTED -> SCANNING
  276. Scan SSID - hexdump_ascii(len=21):
  277. 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 AFK - Fucking Bi
  278. 74 63 68 65 73 tches
  279. Starting AP scan for specific SSID(s)
  280. Scan requested (ret=0) - scan timeout 30 seconds
  281. RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  282. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  283. Wireless event: cmd=0x8b15 len=20
  284. Wireless event: new AP: 00:00:00:00:00:00
  285. Disassociation notification
  286. Added BSSID 00:00:00:00:00:00 into blacklist
  287. CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
  288. Disconnect event - remove keys
  289. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  290. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  291. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  292. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  293. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  294. State: SCANNING -> DISCONNECTED
  295. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  296. netlink: Operstate: linkmode=-1, operstate=5
  297. EAPOL: External notification - portEnabled=0
  298. EAPOL: Supplicant port status: Unauthorized
  299. EAPOL: External notification - portValid=0
  300. EAPOL: Supplicant port status: Unauthorized
  301. EAPOL: External notification - EAP success=0
  302. EAPOL: Supplicant port status: Unauthorized
  303. RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  304. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  305. Wireless event: cmd=0x8b15 len=20
  306. Wireless event: new AP: 00:00:00:00:00:00
  307. Disassociation notification
  308. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  309. CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
  310. Disconnect event - remove keys
  311. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  312. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  313. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  314. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  315. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  316. State: DISCONNECTED -> DISCONNECTED
  317. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  318. netlink: Operstate: linkmode=-1, operstate=5
  319. EAPOL: External notification - portEnabled=0
  320. EAPOL: Supplicant port status: Unauthorized
  321. EAPOL: External notification - portValid=0
  322. EAPOL: Supplicant port status: Unauthorized
  323. EAPOL: External notification - EAP success=0
  324. EAPOL: Supplicant port status: Unauthorized
  325. RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  326. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  327. Wireless event: cmd=0x8b1a len=40
  328. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  329. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  330. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  331. RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
  332. Wireless event: cmd=0x8b15 len=20
  333. Wireless event: new AP: 00:00:00:00:00:00
  334. Disassociation notification
  335. BSSID 00:00:00:00:00:00 blacklist count incremented to 3
  336. CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
  337. Disconnect event - remove keys
  338. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  339. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  340. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  341. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  342. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  343. State: DISCONNECTED -> DISCONNECTED
  344. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  345. netlink: Operstate: linkmode=-1, operstate=5
  346. EAPOL: External notification - portEnabled=0
  347. EAPOL: Supplicant port status: Unauthorized
  348. EAPOL: External notification - portValid=0
  349. EAPOL: Supplicant port status: Unauthorized
  350. EAPOL: External notification - EAP success=0
  351. EAPOL: Supplicant port status: Unauthorized
  352. EAPOL: Supplicant port status: Unauthorized
  353. EAPOL: Supplicant port status: Unauthorized
  354. EAPOL: Supplicant port status: Unauthorized
  355. EAPOL: Supplicant port status: Unauthorized
  356. EAPOL: Supplicant port status: Unauthorized
  357. EAPOL: Supplicant port status: Unauthorized
  358. EAPOL: Supplicant port status: Unauthorized
  359. EAPOL: Supplicant port status: Unauthorized
  360. EAPOL: Supplicant port status: Unauthorized
  361. EAPOL: Supplicant port status: Unauthorized
  362. EAPOL: Supplicant port status: Unauthorized
  363. EAPOL: Supplicant port status: Unauthorized
  364. EAPOL: Supplicant port status: Unauthorized
  365. EAPOL: Supplicant port status: Unauthorized
  366. ^CCTRL-EVENT-TERMINATING - signal 2 received
  367. Removing interface ra0
  368. No keys have been configured - skip key clearing
  369. State: DISCONNECTED -> DISCONNECTED
  370. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  371. netlink: Operstate: linkmode=-1, operstate=5
  372. EAPOL: External notification - portEnabled=0
  373. EAPOL: Supplicant port status: Unauthorized
  374. EAPOL: External notification - portValid=0
  375. EAPOL: Supplicant port status: Unauthorized
  376. EAPOL: External notification - EAP success=0
  377. EAPOL: Supplicant port status: Unauthorized
  378. wpa_driver_wext_set_countermeasures
  379. No keys have been configured - skip key clearing
  380. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  381. Removed BSSID 00:23:69:34:a7:7a from blacklist (clear)
  382. BSS: Remove id 0 BSSID 00:23:69:34:a7:7a SSID 'AFK - Fucking Bitches'
  383. BSS: Remove id 1 BSSID 00:1c:df:4d:1c:a6 SSID 'milk&cereal'
  384. BSS: Remove id 2 BSSID 2e:23:7d:ae:4d:a2 SSID 'hpsetup'
  385. Cancelling scan request
  386. Cancelling authentication timeout
  387. netlink: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement