First of all, thank you to everyone for all the hard work put in to make this happen.
I have followed the instructions exactly, but I am having a problem capturing WPA handshakes.
I run
from an SU Android terminal, and then in the Kali chroot I'm running
Code:
sudo LD_PRELOAD=/system/lib64/kalilibnexmon.so airodump-ng -c 1 -w shell [SSID_NAME]
in one window, where [SSID_NAME] is the SSID of my access point, and
Code:
sudo LD_PRELOAD=/system/lib64/kalilibnexmon.so aireplay-ng -0 1 -a [MAC_ADDRESS] wlan0
in another window, where [MAC_ADDRESS] is the MAC address of my access point, and it works fine. The deauth packet is sent out (so packet injection seems to be working), and as soon as my other phone reconnects to the access point, the first window shows [WPA HANDSHAKE: ... ] in the top right corner of the screen. All looking good.
But when I try to open the CAP file in aircrack-ng it says no WPA handshakes are found, and when I open it in Wireshark it says the EAPOL packets are malformed. They seem to all be truncated to 86 bytes long. Anyone else experiencing this problem?
I can provide more in-depth logs if needed.