Federico C.

Results 9 comments of Federico C.

These commits have been made in order to exploit KrackAttacks in a Ubuntu 16.04 distribution, so no newer versions, and to address the issue described in https://github.com/vanhoefm/krackattacks-scripts/issues/84 . To show...

I can reproduce the same output as Ramon using Ubuntu 16.04, kernel 4.4.0 and wpa_supplicant built from this report along with hostapd built from https://github.com/intrig-unicamp/mininet-wifi/tree/krack-attack . IVs are reset after...

Yeah sorry, I was referring to that line. It's not shown, like the snippet in the first post of this issue.

Yes, I'm using the Python3 virtual environment. This is the output of the script `krack-ft-test.py` on `sta1`: [Xterm.sta1.log](https://github.com/vanhoefm/krackattacks-scripts/files/11343174/Xterm.sta1.log). > Manually seeing that IVs are being reused is currently probably sufficient...

To get the message to appear in a likely vulnerable environment I checked out that removing an IV list reset on every FT reassoc packet makes `IV reuse detected` appear....

Hai ragione, questa scrittura potrebbe portare a pensare che la `b` serva solo per fare un pop dalla pila una-tantum e non per iniziare l'intera lettura di sole `b`. Provo...

Fixed in https://github.com/filippodaniotti/Appunti-LFC/commit/d7ed0b88

Attualmente il file pdf prodotto dal `main.tex` durante il job è caricato come artifact dell'action, che si trova nel sommario dell'action stessa e che scade dopo qualche tempo, e non...

Fixed in https://github.com/filippodaniotti/Appunti-LFC/pull/109/commits/614ef0343c9fd7e7dddfdf43ce73bac9e963284c