-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Could not recover last 2 bytes of hash from the challenge/response. #19
Comments
Obvious questions:
|
My bad.. should have added these details: What have you changed in the config files? What username/password did you use and EAP method? Some logs would be nice (with the user/pass you mention. It's only when a device tries to authenticate using cached credentials when we are running into this issue. It does record username with **DOMAIN**username What client did you use? Android 4, 5, 6, 7? iOS? Windows? Linux? |
I've had this problem for a couple of years now and just installed a fresh copy of v2.6, it seems the issue is still present and extremely easy to replicate. I simply used an iPhone to connect using the following 2 usernames, both with password 'aaa':
Relevant outputs below: # uname -a # ./hostapd-wpe -v # cat /tmp/dict.txt Challenge/response with domain Challenge/response without domain Asleap crack attempt with domain user challenge/response Asleap crack attempt with non-domain user challenge/response Is someone able to assist? |
I believe the issue it the one I fixed in #4. I will try and update that patch to match v2.6. |
I've updated #4 and confirmed it working with v2.6. @atgithub11 @ama21n : could you try it on your side and report your results? |
Yep, works perfectly for me. Great stuff Rogdham! |
I've just tried this again using the same build that was previously working, and I can see the domain gets passed through again both with windows 10 and with iPhone 6 (version 11.3). This causes cracking to fail once again... See below: **mschapv2: Mon Apr 16 21:30:41 2018 Could not recover last 2 bytes of hash from the challenge/response. Sorry it didn't work out.** I rebuilt hostapd version 2.6 (on Linux kali 4.4.0-kali1-686 #1 SMP Debian 4.4.2-3kali1) with the patch referenced above again just to be doubly sure, same result. Any reason why this might be happening, or any further output I could provide to help troubleshoot? |
Helldo @ama21n, Your challenges and response seems to be working on my side:
So it seems that the challenge/response captured by hostapd-wpe are valid. How did you call |
Ahh, you're spot on, not sure what I typed earlier, bash history's been blasted... i'm blaming jetlag ;) thanks for verifying rogdham |
I'm facing the same error
I'm using the following password dictionary which contains the correct password
in a previous message @Rogdham executed the same command and it worked
I'm running asleap version 2.3 (the one included in the current KALI distribution)
I'm running the following Kali distro
I've try to run asleap version 2.2 instead of 2.3, however I'm not able to compile it. Could someone give me a clue about what is going on? |
@fer19861986 the version of For now I suggest reverting on Alternatively, you could use John The Ripper instead, like so:
|
@Rogdham Any help on how to revert to version 2.2? |
@arjentz I really don't know. However you could always try to build from source (should be fast & straightforward like running the commands below), or simply using $ git clone https://github.com/joswr1ght/asleap
$ cd asleap
$ make
$ ./asleap -V |
Thanks. That's what I tried (and checked out an old version), but it didn't work because it couldn't find Anyway, |
I suggest reporting issues when installing |
Hi,
Installed hostapd-wpe by cloning https://github.com/OpenSecurityResearch/hostapd-wpe and all steps were followed as written in the documentation, including applying hostapd-wpe.patch. But each time we run asleap against the captured hashes, following is presented:
Could not recover last 2 bytes of hash from the challenge/response. Sorry it didn't work out.
There was a fix for FreeRADIUS(with_ntdomain_hack = yes) but is there anything similar required for hostapd-wpe?
Also, on another issue raised under aircrack-ng aircrack-ng/aircrack-ng#104
one user had commented that this has been fixed in 2.6 release.
Can someone clarify further on this?
Thanks,
~ A
The text was updated successfully, but these errors were encountered: