vanhoefm / krackattacks-scripts

Other
3.33k stars 768 forks source link

krack-ft-test.py issue in ubuntu 16.04 #49

Closed M9Apar closed 6 years ago

M9Apar commented 6 years ago

i completed all necessary setup for script and successfully tested kract-test-client.py all works fine, but problem arise when i started krack-ft-test i follow all instructions and created configuration file with following

ctrl_interface=wpa_supplicant
network={
ssid="AndroidAP"
key_mgmt=FT-PSK
psk="dfbe542bab34"
}

my android device has patch for CVE-2017-13082 sequence which i follow is

1-> ./disable-hwcrypto.sh then "rebooted " systool -vm ath9k_htc gives me "nohwcript = 1" 2-> sudo wpa_supplicant -D nl80211 -i wlan0 -c network.conf 3-> sudo ./krack-ft-test.py wpa_supplicant -D nl80211 -i wlan0 -c network.conf

so far neither my PC connect with my android device so i manually try to connect but i keep prompt me for right password although password is correct
-> output of step 2 is following

Successfully initialized wpa_supplicant
wlan0: No network configuration found for the current AP
wlan0: CTRL-EVENT-DISCONNECTED bssid=02:1a:11:f4:17:57 reason=3 locally_generated=1
wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
wlan0: No network configuration found for the current AP
wlan0: CTRL-EVENT-DISCONNECTED bssid=02:1a:11:f4:17:57 reason=3 locally_generated=1
wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD

-> at the same time output of step 3 is something like

[15:17:13] Detected normal association frame
[15:17:17] Detected normal association frame
[15:17:19] Detected normal association frame
[15:17:20] Detected normal association frame
[15:17:22] Detected normal association frame
[15:17:26] Detected normal association frame
[15:17:41] Detected normal association frame
Mrvu182hp commented 6 years ago

same problem witch you i waiting for the answer

vanhoefm commented 6 years ago

Your AP doesn't seem to support the FT handshake (which we require to be used in the line key_mgmt=FT-PSK). As a result the /krack-ft-test.py script doesn't work. And it also means your AP cannot be vulnerable to attacks against the FT handshake.