omaidf / KRACK-toolkit

Work in progress toolkit for KRACK attack.
69 stars 32 forks source link

POC attack code updated? #2

Open deepakdaswani opened 7 years ago

deepakdaswani commented 7 years ago

Hi omaidf. Great work with this code! Is this code fully working for the MITM attack? I try to replay it and can't get the client connected to the fake ap. It goes through all the steps, but keeps on sending deauth packets. Meanwhile it sniffes handshake packets which I think correspond to the legitimate packets exchanged between real AP and client. Thanks for your kind attention!

github issue
omaidf commented 7 years ago

Hey Deepak! Sorry for the delay. I've updated the PoC code does this resolve the issue? If not, what WPA2 mode is being MITM?

deepakdaswani commented 7 years ago

Hi Omar. Thanks for your fast reply! I have just tested the new code. Not been able to dedicate a long time to analyze which were the changes. But is still not working for me. It does the same that in the screenshot I sent you. In fact, if I sniff wlan1 now I can see beacon malformed frames... Maybe I'm missing something. Btw, it is WPA2 CCMP . Thanks in advance!

captura de pantalla 2017-11-22 a las 22 10 14