Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Event message available
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: New station 6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Assoc Req IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Event ASSOC (0) received
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Add randomness: count=421 entropy=133
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=16): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=6): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - associated
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: STA included RSN IE in (Re)AssocReq
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: New STA
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: ap_sta_add: register ap_handle_timer timeout for 6e:95:7c:a0:99:3d (300 seconds - ap_max_inactivity)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x60 flags_or=0x0 flags_and=0xfffffff1 authorized=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - event 1 notification
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: addr=6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: P2P: First non-P2P device connected
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - start authentication
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITIALIZE
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: addr=6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x60 flags_or=0x0 flags_and=0xfffffffe authorized=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - unauthorizing port
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK_GROUP entering state IDLE
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state AUTHENTICATION
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state AUTHENTICATION2
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Get randomness: len=32 entropy=134
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from os_get_random - hexdump(len=32): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=20): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from internal pool - hexdump(len=16): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=20): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random from internal pool - hexdump(len=16): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: mixed random - hexdump(len=32): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Assign ANonce - hexdump(len=32): fe 41 2e fe 75 34 67 4d 5f 84 5a e0 cd 3b 66 c0 63 fc 50 be 86 f3 22 43 55 c3 6e 2d 3d 7c 47 93
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITPSK
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKSTART
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - sending 1/4 msg of 4-Way Handshake
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 6e:95:7c:a0:99:3d (300 seconds - ap_max_inactivity)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: l2_packet_receive: src=6e:95:7c:a0:99:3d len=121
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: RX EAPOL from 6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: RX EAPOL - hexdump(len=121): 02 03 00 75 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: IEEE 802.1X: 121 bytes from 6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: IEEE 802.1X: version=2 type=3 length=117
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: RX EAPOL data - hexdump(len=121): 02 03 00 75 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received EAPOL-Key from 6e:95:7c:a0:99:3d key_info=0x10a type=2 mic_len=16 key_data_length=22
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key header (ending before Key MIC) - hexdump(len=77): 02 01 0a 00 10 00 00 00 00 00 00 00 01 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key Key MIC - hexdump(len=16): c0 68 26 bc 8f 08 0b bc a5 a0 a8 af 52 85 96 60
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received Key Nonce - hexdump(len=32): 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Add randomness: count=422 entropy=102
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=16): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random_mix_pool - hexdump(len=32): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: random pool - hexdump(len=128): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - received EAPOL-Key frame (2/4 Pairwise)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKCALCNEGOTIATING
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Searching a PSK for 6e:95:7c:a0:99:3d prev_psk=(nil)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK derivation using PRF(SHA1)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK derivation - A1=74:4c:a1:ff:dc:fd A2=6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Nonce1 - hexdump(len=32): fe 41 2e fe 75 34 67 4d 5f 84 5a e0 cd 3b 66 c0 63 fc 50 be 86 f3 22 43 55 c3 6e 2d 3d 7c 47 93
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Nonce2 - hexdump(len=32): 63 1f 7b 0e 1c 41 66 2f ac c4 5d bc 37 53 d3 3c 5a ab b1 11 c8 6b df 31 90 e3 1a 6a af d7 e4 a3
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PMK - hexdump(len=32): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: PTK - hexdump(len=48): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: KCK - hexdump(len=16): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: KEK - hexdump(len=16): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: TK - hexdump(len=16): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key MIC using HMAC-SHA1
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKCALCNEGOTIATING2
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state PTKINITNEGOTIATING
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - sending 3/4 msg of 4-Way Handshake
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=50 keyidx=1 encr=1)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Plaintext EAPOL-Key Key Data - hexdump(len=64): [REMOVED]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: EAPOL-Key MIC using HMAC-SHA1
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Event message available
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Delete station 6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Event DISASSOC (1) received
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: Disassociation notification
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: * reason 0 (UNKNOWN)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wlan0: * address 6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: Disassociation frame IE(s) - hexdump(len=0): [NULL]
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - disassociated
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - event 2 notification
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: addr=6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state DISCONNECTED
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: WPA: 6e:95:7c:a0:99:3d WPA_PTK entering state INITIALIZE
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x2bcb0270 key_idx=0 set_tx=1 seq_len=0 key_len=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: addr=6e:95:7c:a0:99:3d
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: Set STA flags - ifname=wlan0 addr=6e:95:7c:a0:99:3d total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_logger: STA 6e:95:7c:a0:99:3d - unauthorizing port
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: nl80211: sta_remove -> DEL_STATION wlan0 6e:95:7c:a0:99:3d --> 0 (Success)
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: P2P: Last non-P2P device disconnected
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_ht_operation_update current operation mode=0x0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: hostapd_ht_operation_update new operation mode=0x0 changes=0
- Feb 10 01:18:14 px30-64 wpa_supplicant[243]: ap_free_sta: cancel ap_handle_timer for 6e:95:7c:a0:99:3d
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Event message available
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 20 32 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Frame event
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3220 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
- Feb 10 01:18:18 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Event message available
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 60 32 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Frame event
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3260 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
- Feb 10 01:18:19 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Event message available
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(74:4c:a1:ff:dc:fd) A1=ff:ff:ff:ff:ff:ff A2=64:90:c1:00:1d:f9
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: MLME event frame - hexdump(len=149): 40 00 00 00 ff ff ff ff ff ff 64 90 c1 00 1d f9 ff ff ff ff ff ff 50 35 00 00 01 08 82 84 8b 96 8c 12 98 24 32 04 b0 48 60 6c dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Frame event
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=64:90:c1:00:1d:f9 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=0 fc=0x40 seq_ctrl=0x3550 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=149
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: wlan0: Event RX_MGMT (18) received
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: Probe Request with WPS data received - hexdump(len=101): 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 21 48 10 47 00 10 bd 0f 0b 54 15 7a 5e 4b a0 c5 f5 a7 80 91 49 22 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x104a len=1
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x103a len=1
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1008 len=2
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1047 len=16
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1054 len=8
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x103c len=1
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1002 len=2
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1009 len=2
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1012 len=2
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1021 len=1
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1023 len=1
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1024 len=1
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1011 len=1
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: attr type=0x1049 len=6
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: WPS: WFA subelement id=0 len=1
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: send_mlme - da= 64:90:c1:00:1d:f9 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Use bss->freq=2412
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: CMD_FRAME freq=2412 wait=0 no_cck=0 no_ack=1 offchanok=0
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: CMD_FRAME - hexdump(len=266): 50 00 00 00 64 90 c1 00 1d f9 74 4c a1 ff dc fd 74 4c a1 ff dc fd 00 00 00 00 00 00 00 00 00 00 64 00 11 04 00 08 73 6f 66 74 67 65 6e 74 01 08 82 84 8b 96 0c 12 18 24 03 01 01 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 06 0c 00 2d 1a ec 03 1f ff 00 00 00 00 00 00 00 00 00 96 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 01 00 03 a4 00 00 27 a4 00 00 42 43 5d 00 62 32 2e 00 dd 5c 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 23 14 fd 33 b0 cc 59 6d b0 53 1a 09 8f 3c 8a 6c 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 08 00 02 31 08 10 49 00 06 00 37 2a 00 01 20
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: nl80211: Frame command failed: ret=-1 (Operation not permitted) (freq=2412 wait=0)
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: handle_probe_req: send failed
- Feb 10 01:18:40 px30-64 wpa_supplicant[243]: STA 64:90:c1:00:1d:f9 sent probe request for broadcast SSID
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement