Commit 717abe7
authored
Fix missing return in AttackPMKID.run() preventing result saving
The AttackPMKID.run() method was not returning the result of run_hashcat() or run_aircrack().
This caused the main attack loop (AttackAll) to receive None instead of True when a PMKID was successfully cracked.
As a result:
1. The attack loop continued to the next step (WPA handshake capture) unnecessarily.
2. If the subsequent WPA capture failed, the target was marked as failed.
3. The successfully cracked PMKID password was never saved to cracked.json because the success flag was lost.
This commit adds the missing return statements to ensure the success status is propagated correctly, allowing Wifite to save the cracked key and stop attacking the target immediately.1 parent dc544e0 commit 717abe7
1 file changed
Lines changed: 2 additions & 2 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
241 | 241 | | |
242 | 242 | | |
243 | 243 | | |
244 | | - | |
| 244 | + | |
245 | 245 | | |
246 | | - | |
| 246 | + | |
247 | 247 | | |
248 | 248 | | |
249 | 249 | | |
| |||
0 commit comments