KRACK-toolkit icon indicating copy to clipboard operation
KRACK-toolkit copied to clipboard

POC attack code updated?

Open deepakdaswani opened this issue 7 years ago • 2 comments

Hi omaidf. Great work with this code! Is this code fully working for the MITM attack? I try to replay it and can't get the client connected to the fake ap. It goes through all the steps, but keeps on sending deauth packets. Meanwhile it sniffes handshake packets which I think correspond to the legitimate packets exchanged between real AP and client. Thanks for your kind attention!

github issue

deepakdaswani avatar Nov 21 '17 18:11 deepakdaswani

Hey Deepak! Sorry for the delay. I've updated the PoC code does this resolve the issue? If not, what WPA2 mode is being MITM?

omaidf avatar Nov 22 '17 03:11 omaidf

Hi Omar. Thanks for your fast reply! I have just tested the new code. Not been able to dedicate a long time to analyze which were the changes. But is still not working for me. It does the same that in the screenshot I sent you. In fact, if I sniff wlan1 now I can see beacon malformed frames... Maybe I'm missing something. Btw, it is WPA2 CCMP . Thanks in advance!

captura de pantalla 2017-11-22 a las 22 10 14

deepakdaswani avatar Nov 22 '17 22:11 deepakdaswani