vanhoefm / krackattacks-scripts

Other
3.33k stars 768 forks source link

The result of "./krack-test-client.py" is two. #42

Closed ghost closed 4 years ago

ghost commented 6 years ago

I run "./krack-test-client.py" .

[01:56:53] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:56:54] 81:12:01:20:81:92: sending broadcast ARP to 112.70.10.2 from 112.70.10.1 [01:56:55] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:56:56] 81:12:01:20:81:92: sending broadcast ARP to 112.70.10.2 from 112.70.10.1 [01:56:56] 81:12:01:20:81:92: Received 5 unique replies to replayed broadcast ARP requests. Client is vulnerable to group [01:56:56] key reinstallations in the 4-way handshake (or client accepts replayed broadcast frames)! [01:56:57] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:56:59] 81:12:01:20:81:92:Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:01] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:03] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:05] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:07] 81:12:01:20:81:92:: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:07] 81:12:01:20:81:92: client DOESN'T seem vulnerable to pairwise key reinstallation in the 4-way handshake (using standard attack). [01:57:09] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:11] 81:12:01:20:81:92:Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:13] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4

What does this result mean? Please help me

geektian commented 6 years ago

他是否被干扰 建议在一个没有干扰的地方测试 因为在文件当中有说明丢包对于测试是不准确的 you can translate it above with translator because my English is not good