Hello, using aircrack-ng I have completed the ChopChop attack with this result:
Saving plaintext in replay_dec-0312-145845.cap Saving keystream in replay_dec- 0312-145845.xor Completed in 48s (2.94 bytes/s) Then I have executed: r...@mamone-laptop:~# tcpdump -e -n -s0 -r replay_dec-0312-145845.cap and I have received the answer: reading from file replay_dec-0312-145845.cap, link- type IEEE802_11 (802.11) 14:58:45.892678 DA:00:12:17:65:07:cf BSSID:00:17:c2:81: 64:61 SA:00:17:c2:81:64:5d LLC, dsap SNAP (0xaa) Individual, ssap SNAP (0xaa) Command, ctrl 0x03: oui Ethernet (0x000000), ethertype IPv4 (0x0800): 93.145.25.205.12486 > 192.168.1.170.55224: UDP, length 111 Why I do not find arp who-has .......... tell ...........???? It knows to say me where is the error? Thanks - This is the tcpdump-workers list. Visit https://cod.sandelman.ca/ to unsubscribe.