Skip to content

Commit 717abe7

Browse files
Fix missing return in AttackPMKID.run() preventing result saving
The AttackPMKID.run() method was not returning the result of run_hashcat() or run_aircrack(). This caused the main attack loop (AttackAll) to receive None instead of True when a PMKID was successfully cracked. As a result: 1. The attack loop continued to the next step (WPA handshake capture) unnecessarily. 2. If the subsequent WPA capture failed, the target was marked as failed. 3. The successfully cracked PMKID password was never saved to cracked.json because the success flag was lost. This commit adds the missing return statements to ensure the success status is propagated correctly, allowing Wifite to save the cracked key and stop attacking the target immediately.
1 parent dc544e0 commit 717abe7

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

wifite/attack/pmkid.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -241,9 +241,9 @@ def run(self):
241241
self.view.add_log(f"Channel: {channel_display}")
242242

243243
if self.do_airCRACK:
244-
self.run_aircrack()
244+
return self.run_aircrack()
245245
else:
246-
self.run_hashcat()
246+
return self.run_hashcat()
247247

248248
def run_aircrack(self):
249249
with Airodump(channel=self.target.channel,

0 commit comments

Comments
 (0)