This repository has been archived by the owner on Mar 11, 2018. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 305
hostapd-wpe and with_ntdomain_hack #104
Comments
Are you sure you are working with our patch? Looking at the code in |
I installed hostapd-wpe directly from the Kali Rolling Release repo. However Kali was not updated for a few months when I installed hostapd-wpe. How can I check if I work with the patch? Indeed it looks like there is a workaround in the code, unfortunately I can not test for the moment. |
Check if the installed version is 2.6. |
Yeah, that is the one I have. Precisely:
|
moved to OpenSecurityResearch/hostapd-wpe#19 |
Just tested the patch again and it works just fine with user\domain. |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hey,
While running hostapd-wpe I got a Windows client authenticating.
However asleap did not accept the challenge/response :
Thanks to https://www.nickmurison.me.uk/category/penetration-testing/, it looks like it comes from a FreeRADIUS option:
This issue was already raised on Twitter in 2015 : https://twitter.com/dot11_de/status/588994144565125120
So, is it possible to feed hostapd-wpe with this option or is it something to add?
Thanks :)
The text was updated successfully, but these errors were encountered: