┌──(dimitri㉿kali)-[~] └─$ sudo systemctl stop NetworkManager.service [sudo] password for dimitri: ┌──(dimitri㉿kali)-[~] └─$ sudo systemctl stop wpa_supplicant.service ┌──(dimitri㉿kali)-[~] └─$ sudo hcxdumptool -i wlan0 /home/dimitri/dumpfiles/dumpfile.pcapng --active_beacon --enable_status=15 initialization of hcxdumptool 6.2.7-28-g615b7b7 (depending on the capabilities of the device, this may take some time)... start capturing (stop with ctrl+c) NMEA 0183 PROTOCOL........: N/A PHYSICAL INTERFACE........: phy0 INTERFACE NAME............: wlan0 INTERFACE PROTOCOL........: unassociated INTERFACE TX POWER........: 0 dBm (lowest value reported by the device) INTERFACE HARDWARE MAC....: 1c61b41fb584 (not used for the attack) INTERFACE VIRTUAL MAC.....: 1c61b41fb584 (not used for the attack) DRIVER....................: rtl88XXau (this driver is not recommended - expect driver errors) DRIVER VERSION............: 6.0.0-kali3-amd64 DRIVER FIRMWARE VERSION...: openSSL version...........: 1.0 ERRORMAX..................: 100 errors BPF code blocks...........: 0 FILTERLIST ACCESS POINT...: 0 entries FILTERLIST CLIENT.........: 0 entries FILTERMODE................: unused WEAK CANDIDATE............: 12345678 ESSID list................: 0 entries ACCESS POINT (ROGUE)......: 000df2a2ddcb (BROADCAST WILDCARD used for the attack) ACCESS POINT (ROGUE)......: 000df2a2ddcc (BROADCAST OPEN used for the attack) ACCESS POINT (ROGUE)......: 000df2a2ddcd (used for the attack and incremented on every new client) CLIENT (ROGUE)............: b025aaa0491c EAPOLTIMEOUT..............: 20000 usec EAPOLEAPTIMEOUT...........: 2500000 usec REPLAYCOUNT...............: 64640 ANONCE....................: 580b07296a10e06f1765506dc84bdbaf940724846646f15a0d5640c17d7c0b8d SNONCE....................: 16d1e9e836375d13d6cd01e3b973fe343a1b300f94c635093fdc44898c59ac1f TIME FREQ/CH MAC_DEST MAC_SOURCE ESSID [FRAME TYPE] ^C terminating...