Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- wpa_supplicant v2.0
- random: Trying to read entropy from /dev/random
- Successfully initialized wpa_supplicant
- Initializing interface 'wifi1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
- ctrl_interface='/var/run/wpa_supplicant'
- ctrl_interface_group='wheel'
- update_config=1
- Priority group 0
- id=0 ssid='LJRWireless'
- rfkill: initial event: idx=0 type=2 op=0 soft=0 hard=0
- rfkill: initial event: idx=1 type=1 op=0 soft=1 hard=0
- rfkill: WLAN soft blocked
- SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
- capabilities: key_mgmt 0xf enc 0x1f flags 0x0
- netlink: Operstate: linkmode=1, operstate=5
- wifi1: Own MAC address: c4:04:15:3c:d8:f2
- wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_wext_set_countermeasures
- wifi1: RSN: flushing PMKID list in the driver
- wifi1: Setting scan request: 0 sec 100000 usec
- WPS: Set UUID for interface wifi1
- WPS: UUID based on MAC address - hexdump(len=16): 3e 84 46 81 b1 da 59 ee 98 d2 e6 14 d9 58 d1 98
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: Supplicant port status: Unauthorized
- ctrl_interface_group=10 (from group name 'wheel')
- wifi1: Added interface wifi1
- wifi1: State: DISCONNECTED -> DISCONNECTED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- random: Got 20/20 bytes from /dev/random
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=48
- wifi1: State: DISCONNECTED -> SCANNING
- wifi1: Starting AP scan for wildcard SSID
- Scan requested (ret=0) - scan timeout 10 seconds
- CTRL_IFACE monitor attached - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- RX ctrl_iface - hexdump_ascii(len=10):
- 49 4e 54 45 52 46 41 43 45 53 INTERFACES
- wifi1: Control interface command 'INTERFACES'
- RX ctrl_iface - hexdump_ascii(len=18):
- 47 45 54 5f 43 41 50 41 42 49 4c 49 54 59 20 65 GET_CAPABILITY e
- 61 70 ap
- wifi1: Control interface command 'GET_CAPABILITY eap'
- CTRL_IFACE: GET_CAPABILITY 'eap'
- RX ctrl_iface - hexdump_ascii(len=6):
- 53 54 41 54 55 53 STATUS
- wifi1: Control interface command 'STATUS'
- RX ctrl_iface - hexdump_ascii(len=13):
- 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
- wifi1: Control interface command 'LIST_NETWORKS'
- RX ctrl_iface - hexdump_ascii(len=22):
- 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
- 73 61 62 6c 65 64 sabled
- wifi1: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- EAPOL: disable timer tick
- EAPOL: Supplicant port status: Unauthorized
- Scan timeout - try to get results
- wifi1: Event SCAN_RESULTS (3) received
- Received 3958 bytes of scan results (6 BSSes)
- wifi1: BSS: Start scan result update 1
- wifi1: BSS: Add new id 0 BSSID 98:fc:11:b6:6b:c6 SSID 'LJRWireless'
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wifi1: BSS: Add new id 1 BSSID 04:a1:51:e9:41:45 SSID 'LJRWireless'
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wifi1: BSS: Add new id 2 BSSID 2c:b0:5d:e9:1c:ea SSID 'MATTER100'
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wifi1: BSS: Add new id 3 BSSID 20:aa:4b:62:c1:12 SSID 'RED SOXS'
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wifi1: BSS: Add new id 4 BSSID 2c:b0:5d:fb:29:92 SSID 'CharterWiFi45a8'
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wifi1: BSS: Add new id 5 BSSID 02:aa:4b:62:c1:13 SSID 'RED SOXS-guest'
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- BSS: last_scan_res_used=6/32 last_scan_full=0
- wifi1: New scan results available
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- WPS: AP 04:a1:51:e9:41:45 type 0 added
- WPS: AP 2c:b0:5d:e9:1c:ea type 0 added
- WPS: AP 20:aa:4b:62:c1:12 type 0 added
- WPS: AP 2c:b0:5d:fb:29:92 type 0 added
- WPS: AP[0] 04:a1:51:e9:41:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[1] 2c:b0:5d:e9:1c:ea type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[2] 20:aa:4b:62:c1:12 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- WPS: AP[3] 2c:b0:5d:fb:29:92 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- wifi1: Selecting BSS from priority group 0
- wifi1: 0: 98:fc:11:b6:6b:c6 ssid='LJRWireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-38
- wifi1: selected based on RSN IE
- wifi1: selected BSS 98:fc:11:b6:6b:c6 ssid='LJRWireless'
- wifi1: Request association: reassociate: 0 selected: 98:fc:11:b6:6b:c6 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
- wifi1: Trying to associate with 98:fc:11:b6:6b:c6 (SSID='LJRWireless' freq=2412 MHz)
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wifi1: Cancelling scan request
- wifi1: WPA: clearing own WPA/RSN IE
- wifi1: Automatic auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
- RSN: Search for BSSID 98:fc:11:b6:6b:c6
- RSN: No PMKSA cache entry found
- wifi1: RSN: using IEEE 802.11i/D9.0
- wifi1: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
- wifi1: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- wifi1: WPA: using GTK CCMP
- wifi1: WPA: using PTK CCMP
- wifi1: WPA: using KEY_MGMT WPA-PSK
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- wifi1: No keys have been configured - skip key clearing
- wifi1: State: SCANNING -> ASSOCIATING
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- Limit connection to BSSID 98:fc:11:b6:6b:c6 freq=2412 MHz based on scan results (bssid_set=0)
- wpa_driver_wext_associate
- wpa_driver_wext_set_drop_unencrypted
- wpa_driver_wext_set_psk
- wifi1: Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP fail=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portControl=Auto
- EAPOL: Supplicant port status: Unauthorized
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b06 len=12
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b04 len=16
- RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b1a len=27
- RX ctrl_iface - hexdump_ascii(len=6):
- 53 54 41 54 55 53 STATUS
- wifi1: Control interface command 'STATUS'
- RX ctrl_iface - hexdump_ascii(len=22):
- 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
- 73 61 62 6c 65 64 sabled
- wifi1: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- RX ctrl_iface - hexdump_ascii(len=13):
- 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
- wifi1: Control interface command 'LIST_NETWORKS'
- RX ctrl_iface - hexdump_ascii(len=22):
- 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
- 73 61 62 6c 65 64 sabled
- wifi1: Control interface command 'GET_NETWORK 0 disabled'
- CTRL_IFACE: GET_NETWORK id=0 name='disabled'
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- Wireless event: cmd=0x8b15 len=24
- Wireless event: new AP: 98:fc:11:b6:6b:c6
- wifi1: Event ASSOC (0) received
- wifi1: State: ASSOCIATING -> ASSOCIATED
- wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
- netlink: Operstate: linkmode=-1, operstate=5
- wifi1: Associated to a new BSS: BSSID=98:fc:11:b6:6b:c6
- wifi1: No keys have been configured - skip key clearing
- wifi1: Associated with 98:fc:11:b6:6b:c6
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wifi1: WPA: Association event - clear replay counter
- wifi1: WPA: Clear old PTK
- EAPOL: External notification - portEnabled=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portValid=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - EAP success=0
- EAPOL: Supplicant port status: Unauthorized
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- wifi1: Setting authentication timeout: 10 sec 0 usec
- wifi1: Cancelling scan request
- wifi1: RX EAPOL from 98:fc:11:b6:6b:c6
- wifi1: Setting authentication timeout: 10 sec 0 usec
- wifi1: IEEE 802.1X RX: version=1 type=3 length=95
- wifi1: EAPOL-Key type=2
- wifi1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wifi1: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wifi1: State: ASSOCIATED -> 4WAY_HANDSHAKE
- wifi1: WPA: RX message 1 of 4-Way Handshake from 98:fc:11:b6:6b:c6 (ver=2)
- RSN: msg 1/4 key data - hexdump(len=0):
- WPA: Renewed SNonce - hexdump(len=32): 4d 21 87 06 b2 f9 10 b5 be d1 27 8f 21 96 b4 c7 50 58 05 9f 1b 3e 4b a0 54 f4 51 2d 3c 70 b0 d5
- WPA: PTK derivation - A1=c4:04:15:3c:d8:f2 A2=98:fc:11:b6:6b:c6
- WPA: Nonce1 - hexdump(len=32): 4d 21 87 06 b2 f9 10 b5 be d1 27 8f 21 96 b4 c7 50 58 05 9f 1b 3e 4b a0 54 f4 51 2d 3c 70 b0 d5
- WPA: Nonce2 - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
- WPA: PMK - hexdump(len=32): [REMOVED]
- WPA: PTK - hexdump(len=48): [REMOVED]
- WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- wifi1: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): c8 f6 b3 04 f2 8c de 3d 03 cd ed 98 d1 3c ea ee
- wifi1: RX EAPOL from 98:fc:11:b6:6b:c6
- wifi1: IEEE 802.1X RX: version=1 type=3 length=151
- wifi1: EAPOL-Key type=2
- wifi1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
- wifi1: key_length=16 key_data_length=56
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): e3 24 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 23 7f 1b 95 94 df d6 fa b0 a7 71 96 64 fd cb d6
- RSN: encrypted key data - hexdump(len=56): 10 bc 40 95 dd 59 e7 11 70 4a 54 ee 24 88 90 1d d9 01 ca 70 f5 01 87 2f ff c0 51 2b 47 71 26 e0 24 9b e6 0b 94 f3 1b e1 81 06 98 71 32 95 c1 1a a1 c5 a4 5b 0c 7d d7 01
- WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
- wifi1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wifi1: WPA: RX message 3 of 4-Way Handshake from 98:fc:11:b6:6b:c6 (ver=2)
- WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 e2 4a 6c e5 50 4b 9e 2e 81 f0 9a 75 77 7f 3a 17 dd 00
- WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
- WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
- wifi1: WPA: Sending EAPOL-Key 4/4
- WPA: KCK - hexdump(len=16): [REMOVED]
- WPA: Derived Key MIC - hexdump(len=16): 74 de 33 64 3d 61 05 5f fd 64 6d e7 03 1a e8 88
- wifi1: WPA: Installing PTK to the driver
- wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
- EAPOL: External notification - portValid=1
- wifi1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
- WPA: Group Key - hexdump(len=16): [REMOVED]
- wifi1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
- WPA: RSC - hexdump(len=6): e3 24 00 00 00 00
- wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
- wifi1: WPA: Key negotiation completed with 98:fc:11:b6:6b:c6 [PTK=CCMP GTK=CCMP]
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wifi1: Cancelling authentication timeout
- wifi1: State: GROUP_HANDSHAKE -> COMPLETED
- wifi1: CTRL-EVENT-CONNECTED - Connection to 98:fc:11:b6:6b:c6 completed [id=0 id_str=]
- CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
- wpa_driver_wext_set_operstate: operstate 0->1 (UP)
- netlink: Operstate: linkmode=-1, operstate=6
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed successfully
- RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
- WEXT: if_removed already cleared - ignore event
- RX ctrl_iface - hexdump_ascii(len=6):
- 53 54 41 54 55 53 STATUS
- wifi1: Control interface command 'STATUS'
- RX ctrl_iface - hexdump_ascii(len=22):
- 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
- 73 61 62 6c 65 64 sabled
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement