Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [jayd3e@SOLID Scripts]$ sudo wpa_supplicant -Dwext -ira0 -c/etc/wpa_supplicant.conf -dd
- Initializing interface 'ra0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant.conf'
- ctrl_interface='/var/run/wpa_supplicant'
- ctrl_interface_group='network'
- Line: 3 - start of a new network block
- ssid - hexdump_ascii(len=21):
- 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 AFK - Fucking Bi
- 74 63 68 65 73 tches
- scan_ssid=1 (0x1)
- key_mgmt: 0x2
- PSK - hexdump(len=32): [REMOVED]
- Priority group 0
- id=0 ssid='AFK - Fucking Bitches'
- SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf
- capabilities: key_mgmt 0xf enc 0xf flags 0x0
- netlink: Operstate: linkmode=1, operstate=5
- Own MAC address: 68:7f:74:89:a6:3e
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_countermeasures
- RSN: flushing PMKID list in the driver
- Setting scan request: 0 sec 100000 usec
- WPS: UUID based on MAC address - hexdump(len=16): 8d 4b 27 41 88 5b 5c 36 b2 2e 45 cf 47 ec d9 b2
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- ctrl_interface_group=90 (from group name 'network')
- Added interface ra0
- RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=21):
- 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 AFK - Fucking Bi
- 74 63 68 65 73 tches
- Starting AP scan for specific SSID(s)
- Scan requested (ret=0) - scan timeout 5 seconds
- EAPOL: disable timer tick
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b19 len=8
- Received 544 bytes of scan results (3 BSSes)
- BSS: Start scan result update 1
- BSS: Add new id 0 BSSID 00:23:69:34:a7:7a SSID 'AFK - Fucking Bitches'
- BSS: Add new id 1 BSSID 00:1c:df:4d:1c:a6 SSID 'milk&cereal'
- BSS: Add new id 2 BSSID 2e:23:7d:ae:4d:a2 SSID 'hpsetup'
- New scan results available
- WPS: attr type=0x104a len=1
- WPS: attr type=0x1044 len=1
- WPS: attr type=0x1047 len=16
- WPS: attr type=0x103c len=1
- WPS: attr type=0x104a len=1
- WPS: attr type=0x1044 len=1
- WPS: attr type=0x1047 len=16
- WPS: attr type=0x103c len=1
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:23:69:34:a7:7a ssid='AFK - Fucking Bitches' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 00:23:69:34:a7:7a ssid='AFK - Fucking Bitches'
- Trying to associate with 00:23:69:34:a7:7a (SSID='AFK - Fucking Bitches' freq=2462 MHz)
- Cancelling scan request
- WPA: clearing own WPA/RSN IE
- Automatic auth_alg selection: 0x1
- RSN: using IEEE 802.11i/D9.0
- WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
- WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02 00 00
- WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- No keys have been configured - skip key clearing
- State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- ioctl[SIOCSIWGENIE]: Operation not supported
- wpa_driver_wext_set_psk
- Association request to the driver failed
- Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b1a len=29
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b1a len=29
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b06 len=8
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b04 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b1a len=29
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b19 len=8
- Received 544 bytes of scan results (3 BSSes)
- BSS: Start scan result update 2
- New scan results available
- WPS: attr type=0x104a len=1
- WPS: attr type=0x1044 len=1
- WPS: attr type=0x1047 len=16
- WPS: attr type=0x103c len=1
- WPS: attr type=0x104a len=1
- WPS: attr type=0x1044 len=1
- WPS: attr type=0x1047 len=16
- WPS: attr type=0x103c len=1
- RSN: Ignored PMKID candidate without preauth flag
- Selecting BSS from priority group 0
- Try to find WPA-enabled AP
- 0: 00:23:69:34:a7:7a ssid='AFK - Fucking Bitches' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
- selected based on RSN IE
- selected WPA AP 00:23:69:34:a7:7a ssid='AFK - Fucking Bitches'
- Already associated with the selected AP
- Authentication with 00:23:69:34:a7:7a timed out.
- Added BSSID 00:23:69:34:a7:7a into blacklist
- No keys have been configured - skip key clearing
- State: ASSOCIATING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8c07 len=63
- AssocReq IE wireless event - hexdump(len=55): 00 15 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 74 63 68 65 73 01 08 82 84 8b 96 12 24 48 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:23:69:34:a7:7a
- Association info event
- req_ies - hexdump(len=55): 00 15 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 74 63 68 65 73 01 08 82 84 8b 96 12 24 48 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- State: SCANNING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Associated to a new BSS: BSSID=00:23:69:34:a7:7a
- No keys have been configured - skip key clearing
- Select network based on association information
- Network configuration found for the current AP
- WPA: Using WPA IE from AssocReq to set cipher suites
- WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
- WPA: clearing AP WPA IE
- WPA: clearing AP RSN IE
- WPA: using GTK TKIP
- WPA: using PTK CCMP
- WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- Associated with 00:23:69:34:a7:7a
- WPA: Association event - clear replay counter
- WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- Setting authentication timeout: 10 sec 0 usec
- Cancelling scan request
- RX EAPOL from 00:23:69:34:a7:7a
- RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- Setting authentication timeout: 10 sec 0 usec
- IEEE 802.1X RX: version=1 type=3 length=95
- EAPOL-Key type=2
- key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- State: ASSOCIATED -> 4WAY_HANDSHAKE
- WPA: RX message 1 of 4-Way Handshake from 00:23:69:34:a7:7a (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): ef 44 0a c0 c5 d5 aa 0e f8 34 10 c8 06 66 47 e2 e3 3f 16 5d 00 d0 2e e5 30 77 a2 21 39 3b 92 a2
- WPA: PTK derivation - A1=68:7f:74:89:a6:3e A2=00:23:69:34:a7:7a
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Sending EAPOL-Key 2/4
- WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ef 44 0a c0 c5 d5 aa 0e f8 34 10 c8 06 66 47 e2 e3 3f 16 5d 00 d0 2e e5 30 77 a2 21 39 3b 92 a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e df 65 93 f3 c2 82 8b ac d7 86 22 af 4d f7 21 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- RX EAPOL from 00:23:69:34:a7:7a
- RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d7 d4 a3 71 08 69 a4 0c 70 05 28 6a 8a 67 4a 08 00 50 cc a5 df da 5b f7 61 dd 4f d3 b1 bc 0d 37 57 2b e3 cf aa 7f ef fb 7c e3 b4 46 fc 38 fb 8d 3e 96 85 03 53 20 8d 31 fa 32 1a b0 26 72 ae 1e 06 bc 3a a2 dc 2f 5a d6 18 82 2c d6 4f d4 36 bb 5a 8c bb 70 02 39 ac d9 c4 25 2f 80 06 3a 06 9f 5b b2
- IEEE 802.1X RX: version=1 type=3 length=175
- EAPOL-Key type=2
- key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- key_length=16 key_data_length=80
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 62 0a 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): d7 d4 a3 71 08 69 a4 0c 70 05 28 6a 8a 67 4a 08
- WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 cc f1 bd c0 96 4c b1 9a 3c 5f 8d 15 c2 4e 87 19 5f 80 d9 f4 7c 0b 1d 0a 7e d0 54 55 75 7b e1 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d7 d4 a3 71 08 69 a4 0c 70 05 28 6a 8a 67 4a 08 00 50 cc a5 df da 5b f7 61 dd 4f d3 b1 bc 0d 37 57 2b e3 cf aa 7f ef fb 7c e3 b4 46 fc 38 fb 8d 3e 96 85 03 53 20 8d 31 fa 32 1a b0 26 72 ae 1e 06 bc 3a a2 dc 2f 5a d6 18 82 2c d6 4f d4 36 bb 5a 8c bb 70 02 39 ac d9 c4 25 2f 80 06 3a 06 9f 5b b2
- WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
- WPA: Could not verify EAPOL-Key MIC - dropping packet
- RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: txStart
- WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
- Authentication with 00:23:69:34:a7:7a timed out.
- BSSID 00:23:69:34:a7:7a blacklist count incremented to 2
- wpa_driver_wext_disassociate
- No keys have been configured - skip key clearing
- State: 4WAY_HANDSHAKE -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: SUPP_BE entering state INITIALIZE
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- Setting scan request: 0 sec 0 usec
- State: DISCONNECTED -> SCANNING
- Scan SSID - hexdump_ascii(len=21):
- 41 46 4b 20 2d 20 46 75 63 6b 69 6e 67 20 42 69 AFK - Fucking Bi
- 74 63 68 65 73 tches
- Starting AP scan for specific SSID(s)
- Scan requested (ret=0) - scan timeout 30 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Disassociation notification
- Added BSSID 00:00:00:00:00:00 into blacklist
- CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
- Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: SCANNING -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Disassociation notification
- BSSID 00:00:00:00:00:00 blacklist count incremented to 2
- CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
- Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b1a len=40
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added
- Wireless event: cmd=0x8b15 len=20
- Wireless event: new AP: 00:00:00:00:00:00
- Disassociation notification
- BSSID 00:00:00:00:00:00 blacklist count incremented to 3
- CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
- Disconnect event - remove keys
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- ^CCTRL-EVENT-TERMINATING - signal 2 received
- Removing interface ra0
- No keys have been configured - skip key clearing
- State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- wpa_driver_wext_set_countermeasures
- No keys have been configured - skip key clearing
- Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
- Removed BSSID 00:23:69:34:a7:7a from blacklist (clear)
- BSS: Remove id 0 BSSID 00:23:69:34:a7:7a SSID 'AFK - Fucking Bitches'
- BSS: Remove id 1 BSSID 00:1c:df:4d:1c:a6 SSID 'milk&cereal'
- BSS: Remove id 2 BSSID 2e:23:7d:ae:4d:a2 SSID 'hpsetup'
- Cancelling scan request
- Cancelling authentication timeout
- netlink: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement