WPA2 handshake capture
I'm running a series of test on my own lab-network WPA2 AP. I seem to be having trouble capturing the correct handshake. The handshake always comes back as the exact same sequence of characters as the BSSID of the AP. I've tried this on both my normal home-network router, as well as my test AP. Any ideas as to why this might be happening? It seems to be throwing off aircrack significatly as well, since it is simply passing over the correct password time and time again.
Also, I'm getting notification sometimes in aireplay when trying to deauthenticate a client that the wireless adapter is set to a different channel then the AP, even though I have it set to sniff on the AP's specific channel.
Any ideas/comments are welcome. I know it's probably something I'm doing wrong, but I wasn't able to find any info on these topics elsewhere.
Edit: Forgot to mention that it is a WPA2-CCMP setup, if that makes any difference.