Closed himuura closed 6 years ago
Just read the full article. So i guess i need 1 usb wifi to capture, 1 usb wifi to forward and 1 to jam. cannot seem to find the krack-zero-all script, does the krack-test-client accept the same parameters?
You're looking for the krackattacks-poc-zerokey repository. That PoC script is not actively maintained or supported though.
Hi there! 1st of all, congrats on your research! Tremendous work! 2nd, im trying to replicate a MITM attack with sslstrip but cant quite figure it out. i have a Raspberry pi 2 with a TL-WN722N usb wifi adapter (Kali Linux) and configured hostapd.conf to use the ssid and pre-shared key i'm trying to compromise (don't worry, it's research purposes on my home network). Already did the echo 1 > /proc/sys/net/ipv4/ip_forward so enable redirect but any device that connects to the rogue AP doesn't seem to be redirected, after sslstrip is started. Can it be an iptables issue? Like iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080 ? Thanks in advance!
EDIT: Not after starting sslstrip, after starting the krack-test-client script!! It connects to the AP but no redirect do the internet...