I have a pcap file with two captured packets only.
Time Protocol Info
0.000000 EAPOL Key (Message 3 of 4)
2934.200222 EAPOL Key (Message 2 of 4)
I already know, messages 2 and 3 are sufficient to launch a password recovery attack. I'm still confused about the order: Message 3 was captured long time before message 2. These messages seem to appear in different handshakes. Nevertheless aircrack found a valid
handshake.
Encryption
WPA (1 handshake)
I thought EAPOL messages must appear in same handshake because of exchange of nonce values.
Edit: I have SSID and MAC addresses as well.