efchatz / WPAxFuzz

A full-featured open-source Wi-Fi fuzzer
MIT License
171 stars 17 forks source link

About the SAE Exchange Protocol Fuzz Testing Issue #4

Open D2y6p opened 9 months ago

D2y6p commented 9 months ago

Hello, I have encountered an issue while using WPAxFuzz. When I select 'fuzz SAE Exchange,' WPAxFuzz gets stuck at 'Performing a SAE exchange:' and doesn't proceed further. I traced the problem to the generate_Scalar_Finite function, where the handshake function is being repeatedly called within a loop. What could be causing this issue, and I look forward to your response.

efchatz commented 9 months ago

Hello, can you let me know which Python version you are using, because I will have to check it?

In the meantime, if you want to check this module, you can use this repo: https://github.com/efchatz/easy-exploits/tree/main/Wi-Fi%20(WPA3-SAE), which is a simpler version of the fuzzer for SAE frames. Basically, the fuzzer uses these cases in a more generic way. Another way to check for SAE frame issues is to use the Authentication frame of the Management frames. Some more generic parameters are being tested from Auth module of the fuzzer, like the status code.

D2y6p commented 9 months ago

I apologize for not responding promptly. I am using Python 3.8.10, and thank you for this repo; it may be helpful. At the same time, I also hope to use WPAxFuzz. Below is my config.json, and I have already set two WNICs to monitor mode.

{ "AP_info":{ "AP_MAC_ADDRESS":"Filled", "AP_SSID":"Filled", "AP_CHANNEL":"Filled", "AP_MAC_DIFFERENT_FREQUENCY":"not", "CHANNEL_DIFFERENT_FREQUENCY":"not", "PASSWORD":"Filled" }, "STA_info":{ "TARGETED_STA_MAC_ADDRESS":"Filled" }, "ATT_interface_info":{ "ATTACKING_INTERFACE":"Filled", "MONITORING_INTERFACE":"Filled" } }