Guest User

wpa_supplicant_in_LiveCD

a guest
Mar 30th, 2014
95
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 12.21 KB | None | 0 0
  1. wpa_supplicant v2.0
  2. random: Trying to read entropy from /dev/random
  3. Successfully initialized wpa_supplicant
  4. Initializing interface 'wlp4s5' conf '/root/wpa.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
  5. Configuration file '/root/wpa.conf' -> '/root/wpa.conf'
  6. Reading configuration file '/root/wpa.conf'
  7. Priority group 0
  8.    id=0 ssid='Welcome to Budapest'
  9. WEXT: cfg80211-based driver detected
  10. wext: interface wlp4s5 phy: phy0
  11. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  12. SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  13.   capabilities: key_mgmt 0xf enc 0x1f flags 0x0
  14. netlink: Operstate: linkmode=1, operstate=5
  15. wlp4s5: Own MAC address: 00:18:e7:cc:d5:62
  16. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  17. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  18. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  19. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  20. wpa_driver_wext_set_countermeasures
  21. wlp4s5: RSN: flushing PMKID list in the driver
  22. wlp4s5: Setting scan request: 0 sec 100000 usec
  23. EAPOL: SUPP_PAE entering state DISCONNECTED
  24. EAPOL: Supplicant port status: Unauthorized
  25. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  26. EAPOL: SUPP_BE entering state INITIALIZE
  27. EAP: EAP entering state DISABLED
  28. EAPOL: Supplicant port status: Unauthorized
  29. EAPOL: Supplicant port status: Unauthorized
  30. wlp4s5: Added interface wlp4s5
  31. wlp4s5: State: DISCONNECTED -> DISCONNECTED
  32. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  33. netlink: Operstate: linkmode=-1, operstate=5
  34. random: Got 20/20 bytes from /dev/random
  35. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  36. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  37. WEXT: if_removed already cleared - ignore event
  38. Wireless event: cmd=0x8b06 len=12
  39. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  40. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  41. WEXT: if_removed already cleared - ignore event
  42. Wireless event: cmd=0x8b1a len=16
  43. wlp4s5: State: DISCONNECTED -> SCANNING
  44. wlp4s5: Starting AP scan for wildcard SSID
  45. Scan requested (ret=0) - scan timeout 10 seconds
  46. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  47. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  48. WEXT: if_removed already cleared - ignore event
  49. Wireless event: cmd=0x8b19 len=16
  50. wlp4s5: Event SCAN_RESULTS (3) received
  51. Received 665 bytes of scan results (1 BSSes)
  52. wlp4s5: BSS: Start scan result update 1
  53. wlp4s5: BSS: Add new id 0 BSSID 58:98:35:94:56:3b SSID 'Welcome to Budapest'
  54. BSS: last_scan_res_used=1/32 last_scan_full=0
  55. wlp4s5: New scan results available
  56. wlp4s5: Selecting BSS from priority group 0
  57. wlp4s5: 0: 58:98:35:94:56:3b ssid='Welcome to Budapest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-42 wps
  58. wlp4s5:    selected based on RSN IE
  59. wlp4s5:    selected BSS 58:98:35:94:56:3b ssid='Welcome to Budapest'
  60. wlp4s5: Request association: reassociate: 0  selected: 58:98:35:94:56:3b  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
  61. wlp4s5: Trying to associate with 58:98:35:94:56:3b (SSID='Welcome to Budapest' freq=2472 MHz)
  62. wlp4s5: Cancelling scan request
  63. wlp4s5: WPA: clearing own WPA/RSN IE
  64. wlp4s5: Automatic auth_alg selection: 0x1
  65. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  66. RSN: Search for BSSID 58:98:35:94:56:3b
  67. RSN: No PMKSA cache entry found
  68. wlp4s5: RSN: using IEEE 802.11i/D9.0
  69. wlp4s5: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  70. wlp4s5: WPA: clearing AP WPA IE
  71. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  72. wlp4s5: WPA: using GTK CCMP
  73. wlp4s5: WPA: using PTK CCMP
  74. wlp4s5: WPA: using KEY_MGMT WPA-PSK
  75. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  76. wlp4s5: No keys have been configured - skip key clearing
  77. wlp4s5: State: SCANNING -> ASSOCIATING
  78. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  79. netlink: Operstate: linkmode=-1, operstate=5
  80. Limit connection to BSSID 58:98:35:94:56:3b freq=2472 MHz based on scan results (bssid_set=0)
  81. wpa_driver_wext_associate
  82. wpa_driver_wext_set_drop_unencrypted
  83. wpa_driver_wext_set_psk
  84. wlp4s5: Association request to the driver failed
  85. wlp4s5: Setting authentication timeout: 5 sec 0 usec
  86. EAPOL: External notification - EAP success=0
  87. EAPOL: Supplicant port status: Unauthorized
  88. EAPOL: External notification - EAP fail=0
  89. EAPOL: Supplicant port status: Unauthorized
  90. EAPOL: External notification - portControl=Auto
  91. EAPOL: Supplicant port status: Unauthorized
  92. RSN: Ignored PMKID candidate without preauth flag
  93. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  94. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  95. WEXT: if_removed already cleared - ignore event
  96. Wireless event: cmd=0x8b1a len=16
  97. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  98. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  99. WEXT: if_removed already cleared - ignore event
  100. Wireless event: cmd=0x8b06 len=12
  101. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  102. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  103. WEXT: if_removed already cleared - ignore event
  104. Wireless event: cmd=0x8b1a len=35
  105. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  106. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  107. WEXT: if_removed already cleared - ignore event
  108. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  109. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  110. WEXT: if_removed already cleared - ignore event
  111. Wireless event: cmd=0x8c08 len=166
  112. AssocResp IE wireless event - hexdump(len=150): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 1e 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0d 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 08 00 0c 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  113. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  114. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
  115. WEXT: if_removed already cleared - ignore event
  116. Wireless event: cmd=0x8b15 len=24
  117. Wireless event: new AP: 58:98:35:94:56:3b
  118. wlp4s5: Event ASSOCINFO (4) received
  119. wlp4s5: Association info event
  120. resp_ies - hexdump(len=150): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 1e 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0d 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 08 00 0c 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  121. wlp4s5: Event ASSOC (0) received
  122. wlp4s5: State: ASSOCIATING -> ASSOCIATED
  123. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  124. netlink: Operstate: linkmode=-1, operstate=5
  125. wlp4s5: Associated to a new BSS: BSSID=58:98:35:94:56:3b
  126. wlp4s5: No keys have been configured - skip key clearing
  127. wlp4s5: Associated with 58:98:35:94:56:3b
  128. wlp4s5: WPA: Association event - clear replay counter
  129. wlp4s5: WPA: Clear old PTK
  130. EAPOL: External notification - portEnabled=0
  131. EAPOL: Supplicant port status: Unauthorized
  132. EAPOL: External notification - portValid=0
  133. EAPOL: Supplicant port status: Unauthorized
  134. EAPOL: External notification - EAP success=0
  135. EAPOL: Supplicant port status: Unauthorized
  136. EAPOL: External notification - portEnabled=1
  137. EAPOL: SUPP_PAE entering state CONNECTING
  138. EAPOL: SUPP_BE entering state IDLE
  139. wlp4s5: Setting authentication timeout: 10 sec 0 usec
  140. wlp4s5: Cancelling scan request
  141. wlp4s5: RX EAPOL from 58:98:35:94:56:3b
  142. wlp4s5: Setting authentication timeout: 10 sec 0 usec
  143. wlp4s5: IEEE 802.1X RX: version=2 type=3 length=95
  144. wlp4s5:   EAPOL-Key type=2
  145. wlp4s5:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  146. wlp4s5:   key_length=16 key_data_length=0
  147.   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  148.   key_nonce - hexdump(len=32): 23 8b a4 11 db 91 61 77 12 bb f5 06 1a c8 40 15 7f a1 96 1b f4 70 e1 ef ac 83 6a be 7c 8b 49 62
  149.   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  150.   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  151.   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  152.   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  153. wlp4s5: State: ASSOCIATED -> 4WAY_HANDSHAKE
  154. wlp4s5: WPA: RX message 1 of 4-Way Handshake from 58:98:35:94:56:3b (ver=2)
  155. RSN: msg 1/4 key data - hexdump(len=0):
  156. WPA: Renewed SNonce - hexdump(len=32): 27 1e da ad 63 cd 21 8a 74 47 09 64 be b7 6c 95 fc ca fc d9 b7 b8 9d 0d 54 01 19 48 04 e8 55 c8
  157. WPA: PTK derivation - A1=00:18:e7:cc:d5:62 A2=58:98:35:94:56:3b
  158. WPA: Nonce1 - hexdump(len=32): 27 1e da ad 63 cd 21 8a 74 47 09 64 be b7 6c 95 fc ca fc d9 b7 b8 9d 0d 54 01 19 48 04 e8 55 c8
  159. WPA: Nonce2 - hexdump(len=32): 23 8b a4 11 db 91 61 77 12 bb f5 06 1a c8 40 15 7f a1 96 1b f4 70 e1 ef ac 83 6a be 7c 8b 49 62
  160. WPA: PMK - hexdump(len=32): [REMOVED]
  161. WPA: PTK - hexdump(len=48): [REMOVED]
  162. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  163. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  164. wlp4s5: WPA: Sending EAPOL-Key 2/4
  165. WPA: KCK - hexdump(len=16): [REMOVED]
  166. WPA: Derived Key MIC - hexdump(len=16): ce 85 ec 4d 47 72 bf 63 36 2e b4 5f ad 07 1d 9f
  167. wlp4s5: RX EAPOL from 58:98:35:94:56:3b
  168. wlp4s5: IEEE 802.1X RX: version=2 type=3 length=151
  169. wlp4s5:   EAPOL-Key type=2
  170. wlp4s5:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  171. wlp4s5:   key_length=16 key_data_length=56
  172.   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  173.   key_nonce - hexdump(len=32): 23 8b a4 11 db 91 61 77 12 bb f5 06 1a c8 40 15 7f a1 96 1b f4 70 e1 ef ac 83 6a be 7c 8b 49 62
  174.   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  175.   key_rsc - hexdump(len=8): 00 00 00 00 00 00 08 43
  176.   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  177.   key_mic - hexdump(len=16): 33 92 53 ff 51 ed be 56 62 70 27 17 d6 72 b3 8c
  178. RSN: encrypted key data - hexdump(len=56): c4 bf 7e 3b b2 f1 f0 2c 76 e5 70 6d 64 48 c2 b0 be f0 2e d4 28 91 bc 58 73 52 63 82 f1 d4 47 a9 81 a1 47 6a 84 f3 41 68 b4 4e c4 b6 78 10 72 ef a2 ac 1f ec 2a d7 9c 84
  179. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  180. wlp4s5: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  181. wlp4s5: WPA: RX message 3 of 4-Way Handshake from 58:98:35:94:56:3b (ver=2)
  182. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 f4 7c 1e 8e 11 bb fb 1c 94 d8 c8 a7 b1 d2 94 a0 dd 00
  183. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
  184. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  185. wlp4s5: WPA: Sending EAPOL-Key 4/4
  186. WPA: KCK - hexdump(len=16): [REMOVED]
  187. WPA: Derived Key MIC - hexdump(len=16): 56 da 12 38 c0 ab e0 fc 0f 1f 7a c2 c0 65 ee 2e
  188. wlp4s5: WPA: Installing PTK to the driver
  189. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  190. EAPOL: External notification - portValid=1
  191. wlp4s5: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  192. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  193. WPA: Group Key - hexdump(len=16): [REMOVED]
  194. wlp4s5: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
  195. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  196. wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
  197. wlp4s5: WPA: Key negotiation completed with 58:98:35:94:56:3b [PTK=CCMP GTK=CCMP]
  198. wlp4s5: Cancelling authentication timeout
  199. wlp4s5: State: GROUP_HANDSHAKE -> COMPLETED
  200. wlp4s5: CTRL-EVENT-CONNECTED - Connection to 58:98:35:94:56:3b completed [id=0 id_str=]
  201. wpa_driver_wext_set_operstate: operstate 0->1 (UP)
  202. netlink: Operstate: linkmode=-1, operstate=6
  203. EAPOL: External notification - portValid=1
  204. EAPOL: External notification - EAP success=1
  205. EAPOL: SUPP_PAE entering state AUTHENTICATING
  206. EAPOL: SUPP_BE entering state SUCCESS
  207. EAP: EAP entering state DISABLED
  208. EAPOL: SUPP_PAE entering state AUTHENTICATED
  209. EAPOL: Supplicant port status: Authorized
  210. EAPOL: SUPP_BE entering state IDLE
  211. EAPOL authentication completed successfully
  212. RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  213. RTM_NEWLINK, IFLA_IFNAME
Add Comment
Please, Sign In to add comment