Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- wpa_supplicant v2.0
- random: Trying to read entropy from /dev/random
- Successfully initialized wpa_supplicant
- Initializing interface 'wlp4s5' conf '/root/wpa.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/root/wpa.conf' -> '/root/wpa.conf'
- Reading configuration file '/root/wpa.conf'
- Priority group 0
- id=0 ssid='Welcome to Budapest'
- WEXT: cfg80211-based driver detected
- wext: interface wlp4s5 phy: phy0
- rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
- SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
- capabilities: key_mgmt 0xf enc 0x1f flags 0x0
- netlink: Operstate: linkmode=1, operstate=5
- wlp4s5: Own MAC address: 00:18:e7:cc:d5:62
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_countermeasures
- wlp4s5: RSN: flushing PMKID list in the driver
- wlp4s5: Setting scan request: 0 sec 100000 usec
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- wlp4s5: Added interface wlp4s5
- wlp4s5: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- random: Got 20/20 bytes from /dev/random
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=16
- wlp4s5: State: DISCONNECTED -> SCANNING
- wlp4s5: Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 10 seconds
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b19 len=16
- wlp4s5: Event SCAN_RESULTS (3) received
- Received 665 bytes of scan results (1 BSSes)
- wlp4s5: BSS: Start scan result update 1
- wlp4s5: BSS: Add new id 0 BSSID 58:98:35:94:56:3b SSID 'Welcome to Budapest'
- BSS: last_scan_res_used=1/32 last_scan_full=0
- wlp4s5: New scan results available
- wlp4s5: Selecting BSS from priority group 0
- wlp4s5: 0: 58:98:35:94:56:3b ssid='Welcome to Budapest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-42 wps
- wlp4s5: selected based on RSN IE
- wlp4s5: selected BSS 58:98:35:94:56:3b ssid='Welcome to Budapest'
- wlp4s5: Request association: reassociate: 0 selected: 58:98:35:94:56:3b bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wlp4s5: Trying to associate with 58:98:35:94:56:3b (SSID='Welcome to Budapest' freq=2472 MHz)
- wlp4s5: Cancelling scan request
- wlp4s5: WPA: clearing own WPA/RSN IE
- wlp4s5: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
- RSN: Search for BSSID 58:98:35:94:56:3b
- RSN: No PMKSA cache entry found
- wlp4s5: RSN: using IEEE 802.11i/D9.0
- wlp4s5: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
- wlp4s5: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
- wlp4s5: WPA: using GTK CCMP
- wlp4s5: WPA: using PTK CCMP
- wlp4s5: WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- wlp4s5: No keys have been configured - skip key clearing
- wlp4s5: State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Limit connection to BSSID 58:98:35:94:56:3b freq=2472 MHz based on scan results (bssid_set=0)
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- wlp4s5: Association request to the driver failed
- wlp4s5: Setting authentication timeout: 5 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RSN: Ignored PMKID candidate without preauth flag
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=35
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8c08 len=166
- AssocResp IE wireless event - hexdump(len=150): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 1e 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0d 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 08 00 0c 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp4s5' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 58:98:35:94:56:3b
- wlp4s5: Event ASSOCINFO (4) received
- wlp4s5: Association info event
- resp_ies - hexdump(len=150): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 1e 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0d 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 4a 0e 14 00 0a 00 2c 01 c8 00 14 00 05 00 19 00 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 08 00 0c 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- wlp4s5: Event ASSOC (0) received
- wlp4s5: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wlp4s5: Associated to a new BSS: BSSID=58:98:35:94:56:3b
- wlp4s5: No keys have been configured - skip key clearing
- wlp4s5: Associated with 58:98:35:94:56:3b
- wlp4s5: WPA: Association event - clear replay counter
- wlp4s5: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- wlp4s5: Setting authentication timeout: 10 sec 0 usec
- wlp4s5: Cancelling scan request
- wlp4s5: RX EAPOL from 58:98:35:94:56:3b
- wlp4s5: Setting authentication timeout: 10 sec 0 usec
- wlp4s5: IEEE 802.1X RX: version=2 type=3 length=95
- wlp4s5: EAPOL-Key type=2
- wlp4s5: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlp4s5: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 23 8b a4 11 db 91 61 77 12 bb f5 06 1a c8 40 15 7f a1 96 1b f4 70 e1 ef ac 83 6a be 7c 8b 49 62
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlp4s5: State: ASSOCIATED -> 4WAY_HANDSHAKE
- wlp4s5: WPA: RX message 1 of 4-Way Handshake from 58:98:35:94:56:3b (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 27 1e da ad 63 cd 21 8a 74 47 09 64 be b7 6c 95 fc ca fc d9 b7 b8 9d 0d 54 01 19 48 04 e8 55 c8
- WPA: PTK derivation - A1=00:18:e7:cc:d5:62 A2=58:98:35:94:56:3b
- WPA: Nonce1 - hexdump(len=32): 27 1e da ad 63 cd 21 8a 74 47 09 64 be b7 6c 95 fc ca fc d9 b7 b8 9d 0d 54 01 19 48 04 e8 55 c8
- WPA: Nonce2 - hexdump(len=32): 23 8b a4 11 db 91 61 77 12 bb f5 06 1a c8 40 15 7f a1 96 1b f4 70 e1 ef ac 83 6a be 7c 8b 49 62
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- wlp4s5: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): ce 85 ec 4d 47 72 bf 63 36 2e b4 5f ad 07 1d 9f
- wlp4s5: RX EAPOL from 58:98:35:94:56:3b
- wlp4s5: IEEE 802.1X RX: version=2 type=3 length=151
- wlp4s5: EAPOL-Key type=2
- wlp4s5: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- wlp4s5: key_length=16 key_data_length=56
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): 23 8b a4 11 db 91 61 77 12 bb f5 06 1a c8 40 15 7f a1 96 1b f4 70 e1 ef ac 83 6a be 7c 8b 49 62
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 08 43
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 33 92 53 ff 51 ed be 56 62 70 27 17 d6 72 b3 8c
- RSN: encrypted key data - hexdump(len=56): c4 bf 7e 3b b2 f1 f0 2c 76 e5 70 6d 64 48 c2 b0 be f0 2e d4 28 91 bc 58 73 52 63 82 f1 d4 47 a9 81 a1 47 6a 84 f3 41 68 b4 4e c4 b6 78 10 72 ef a2 ac 1f ec 2a d7 9c 84
- WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
- wlp4s5: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wlp4s5: WPA: RX message 3 of 4-Way Handshake from 58:98:35:94:56:3b (ver=2)
- WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 f4 7c 1e 8e 11 bb fb 1c 94 d8 c8 a7 b1 d2 94 a0 dd 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
- WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
- wlp4s5: WPA: Sending EAPOL-Key 4/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 56 da 12 38 c0 ab e0 fc 0f 1f 7a c2 c0 65 ee 2e
- wlp4s5: WPA: Installing PTK to the driver
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- EAPOL: External notification - portValid=1
- wlp4s5: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
- WPA: Group Key - hexdump(len=16): [REMOVED]
- wlp4s5: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
- wlp4s5: WPA: Key negotiation completed with 58:98:35:94:56:3b [PTK=CCMP GTK=CCMP]
- wlp4s5: Cancelling authentication timeout
- wlp4s5: State: GROUP_HANDSHAKE -> COMPLETED
- wlp4s5: CTRL-EVENT-CONNECTED - Connection to 58:98:35:94:56:3b completed [id=0 id_str=]
- wpa_driver_wext_set_operstate: operstate 0->1 (UP)
- netlink: Operstate: linkmode=-1, operstate=6
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed successfully
- RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME
Add Comment
Please, Sign In to add comment