vanhoefm / krackattacks-scripts

Other
3.33k stars 768 forks source link

Not able to see if I am vunerable or not #53

Closed mbreban closed 6 years ago

mbreban commented 6 years ago

Hi, I successfuly installed and configured the project. However when I run krack-test-client.py, I am not able to see if I am vulnerable of not.

What I am doing wrong?

$ sudo ./krack-test-client.py
[10:36:51] Note: disable Wi-Fi in network manager & disable hardware encryption. Both may interfere with this script.
[10:36:53] Starting hostapd ...
Configuration file: /home/ubuntu/repos/krackattacks-scripts/krackattack/hostapd.conf
Using interface wlp58s0 with hwaddr d6:dd:87:14:c2:53 and ssid "testnetwork"
wlp58s0: interface state UNINITIALIZED->ENABLED
wlp58s0: AP-ENABLED 
[10:36:54] Ready. Connect to this Access Point to start the tests. Make sure the client requests an IP using DHCP!
wlp58s0: STA 00:0c:e7:02:86:dd IEEE 802.11: authenticated
wlp58s0: STA 00:0c:e7:02:86:dd IEEE 802.11: associated (aid 1)
[10:36:58] 00:0c:e7:02:86:dd: Hostapd: Resetting Tx IV of group key and sending Msg3/4
wlp58s0: AP-STA-CONNECTED 00:0c:e7:02:86:dd
wlp58s0: STA 00:0c:e7:02:86:dd RADIUS: starting accounting session 8A1EDD0CD73B9607
[10:37:00] 00:0c:e7:02:86:dd: Hostapd: already installing pairwise key
[10:37:00] 00:0c:e7:02:86:dd: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[10:37:02] 00:0c:e7:02:86:dd: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[10:37:02] 00:0c:e7:02:86:dd: DHCP reply 192.168.100.2 to 00:0c:e7:02:86:dd
[10:37:04] 00:0c:e7:02:86:dd: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[10:37:06] 00:0c:e7:02:86:dd: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[10:37:08] 00:0c:e7:02:86:dd: Hostapd: Resetting Tx IV of group key and sending Msg3/4
[10:37:10] 00:0c:e7:02:86:dd: Hostapd: Resetting Tx IV of group key and sending Msg3/4
...
[10:37:42] 00:0c:e7:02:86:dd: Hostapd: Resetting Tx IV of group key and sending Msg3/4

Same for krack-test-client.py --group

$ sudo ./krack-test-client.py --group
[10:42:39] Note: disable Wi-Fi in network manager & disable hardware encryption. Both may interfere with this script.
[10:42:40] Starting hostapd ...
Configuration file: /home/ubuntu/repos/krackattacks-scripts/krackattack/hostapd.conf
Using interface wlp58s0 with hwaddr d6:dd:87:14:c2:53 and ssid "testnetwork"
wlp58s0: interface state UNINITIALIZED->ENABLED
wlp58s0: AP-ENABLED 
[10:42:41] Hostapd: starting group key handshake tests
[10:42:41] Ready. Connect to this Access Point to start the tests. Make sure the client requests an IP using DHCP!
wlp58s0: STA 00:0c:e7:02:86:dd IEEE 802.11: authenticated
wlp58s0: STA 00:0c:e7:02:86:dd IEEE 802.11: associated (aid 1)
wlp58s0: AP-STA-CONNECTED 00:0c:e7:02:86:dd
wlp58s0: STA 00:0c:e7:02:86:dd RADIUS: starting accounting session 8E51ACE867ADC700
wlp58s0: STA 00:0c:e7:02:86:dd WPA: pairwise key handshake completed (RSN)
[10:42:47] 00:0c:e7:02:86:dd: DHCP reply 192.168.100.2 to 00:0c:e7:02:86:dd
wlp58s0: STA 00:0c:e7:02:86:dd WPA: group key handshake completed (RSN)
wlp58s0: STA 00:0c:e7:02:86:dd WPA: group key handshake completed (RSN)
wlp58s0: STA 00:0c:e7:02:86:dd WPA: group key handshake completed (RSN)
wlp58s0: STA 00:0c:e7:02:86:dd WPA: group key handshake completed (RSN)
wlp58s0: STA 00:0c:e7:02:86:dd WPA: group key handshake completed (RSN)
wlp58s0: STA 00:0c:e7:02:86:dd WPA: group key handshake completed (RSN)
wlp58s0: STA 00:0c:e7:02:86:dd WPA: group key handshake completed (RSN)
...
wlp58s0: STA 00:0c:e7:02:86:dd WPA: group key handshake completed (RSN)

Thanks in advance. :)

kangdd commented 6 years ago

need to wait for a long time.

mbreban commented 6 years ago

I used a WiFi USB dongle and it works now.