derv82 / wifite

3.19k stars 742 forks source link

KRACK support #117

Open Demialter opened 6 years ago

Demialter commented 6 years ago

Would it be possible to use the newly discovered WPA2 vulnerability to extract the encryption key?

https://www.krackattacks.com/

Ecksters commented 6 years ago

According to the site:

Our attacks do not leak the encryption key.

The primary use, as demonstrated by them, would be to set yourself between the client and AP, and strip SSL off of all websites, allowing you to capture and use session packets or other sensitive data. This also would be ineffective against websites that simply do not allow non-HTTPS access.

As most Linux OSs and Windows, and soon Apple have already patched this issue, and none of those were particularly vulnerable to begin with, going forward it will likely only continue to be effective against, of course, unpatched machines.

More specifically, Android devices in particular, which were already the most vulnerable, are the most likely to remain unpatched, as Android OEMs are typically slow or unlikely to release patches, along with access points which act as a client (any AP that uses wireless bridging, including extenders), since users rarely update their firmware, and most likely not all APs will receive updates.

I still would like to see it implemented, but as Wifite in the past has been primarily focused on obtaining wifi keys, rather than other information from a decrypted network, it would require a lot of reworking. It would only be useful if Wifite also implemented a MitM feature with SSL stripping.

For the most convenience it would also need to automatically perform session hijacking or data sniffing, although external programs like Wireshark could potentially be used to do that side of things.

kimocoder commented 6 years ago

Correct, it's a MITM attack not a key exploit. As @derv82 seems to have gone offline again it's not likely that it's going to happen. Anyways, some new key extration attacks would be great, as both WPS lockout has been implementated in newer routers and less the usage of WEP encrytion made things harder.

What i would like, is mdk3 implementation to use those two (flood attack is one of them) attacks for avoiding WPS timeout lockouts.

its0x08 commented 6 years ago

Its ofc a MITM exploit but it may be used to get wifi key combinated with an eviltwin attack ! victim can get redirected to eviltwin site without disconnecting from the original AP.