Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Passive sniff mode spams deauth packets #49

Open
0ffheal opened this issue Jan 28, 2024 · 0 comments
Open

Passive sniff mode spams deauth packets #49

0ffheal opened this issue Jan 28, 2024 · 0 comments

Comments

@0ffheal
Copy link

0ffheal commented Jan 28, 2024

Summary:
Sniff PMKID mode spams broadcast deauth packets from every AP it sees even when selecting any of the "passive" modes in the flipperzero menu.

Steps to reproduce:
Flipperzero running Unleashed Firmware 069e with version 0.6.6 of the wifi-marauder companion app.
ESP32 wifi dev board running the ESP32 Marauder firmware installed using FZEasyMarauderFlash
Nearby computer with wifi interface in monitor mode
(optional: phone attached to wifi network)

On the nearby computer, open a wireshark session on the wifi interface in monitor mode, and observe raw wifi traffic. Set the wireshark filter to "wlan.fc.type_subtype == 0x000c" to filter for deauth frames.

On the flipperzero, navigate to the wifi marauder app, select "sniff" for PKMID, then select "Passive".

EAPOL messages should start appearing on the flipperzero.
Deauth Broadcast Frames appear in wireshark.

Expected Behaviour:
Passive mode should not be expected to transmit any signals to other devices. It should be listen only. Sending deauth frames should be under the "Active" option.

@0ffheal 0ffheal changed the title Passive mode spams deauth packets Passive sniff mode spams deauth packets Jan 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant