[01:56:53] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:56:54] 81:12:01:20:81:92: sending broadcast ARP to 112.70.10.2 from 112.70.10.1
[01:56:55] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:56:56] 81:12:01:20:81:92: sending broadcast ARP to 112.70.10.2 from 112.70.10.1
[01:56:56] 81:12:01:20:81:92: Received 5 unique replies to replayed broadcast ARP requests. Client is vulnerable to group[01:56:56] key reinstallations in the 4-way handshake (or client accepts replayed broadcast frames)!
[01:56:57] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:56:59] 81:12:01:20:81:92:Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:57:01] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:57:03] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:57:05] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:57:07] 81:12:01:20:81:92:: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:57:07] 81:12:01:20:81:92: client DOESN'T seem vulnerable to pairwise key reinstallation in the 4-way handshake (using standard attack).
[01:57:09] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:57:11] 81:12:01:20:81:92:Hostapd: Resetting Tx IV of group key and sending Msg3/4
[01:57:13] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
I run "./krack-test-client.py" .
[01:56:53] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:56:54] 81:12:01:20:81:92: sending broadcast ARP to 112.70.10.2 from 112.70.10.1 [01:56:55] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:56:56] 81:12:01:20:81:92: sending broadcast ARP to 112.70.10.2 from 112.70.10.1 [01:56:56] 81:12:01:20:81:92: Received 5 unique replies to replayed broadcast ARP requests. Client is vulnerable to group [01:56:56] key reinstallations in the 4-way handshake (or client accepts replayed broadcast frames)! [01:56:57] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:56:59] 81:12:01:20:81:92:Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:01] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:03] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:05] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:07] 81:12:01:20:81:92:: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:07] 81:12:01:20:81:92: client DOESN'T seem vulnerable to pairwise key reinstallation in the 4-way handshake (using standard attack). [01:57:09] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:11] 81:12:01:20:81:92:Hostapd: Resetting Tx IV of group key and sending Msg3/4 [01:57:13] 81:12:01:20:81:92: Hostapd: Resetting Tx IV of group key and sending Msg3/4
What does this result mean? Please help me