krackattacks-poc-zerokey icon indicating copy to clipboard operation
krackattacks-poc-zerokey copied to clipboard

Try to krackattacks-poc-zerokey but doen not work properly

Open Smith31 opened this issue 6 years ago • 0 comments

Thank you this script. I try to this script.Attacker Kali Linux be attacked Ubuntu 15.10 (wpa_supplicant 2.4) I check disconnect real channel(1ch). And I check rogue channel(11ch). Be attacked Client unconnected. After try to rogue channel but require password. and end krackattacks-poc-zerokey.py I don't know why don't work properly.

[11:23:16] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1412) [11:23:17] Rogue channel: 00:00:00:00:00:00 -> ff:ff:ff:ff:ff:ff: ProbeReq(seq=4082) [11:23:17] Rogue channel: 00:00:00:00:00:00 -> ff:ff:ff:ff:ff:ff: ProbeReq(seq=4083) [11:23:17] Rogue channel: injected Disassociation to 00:00:00:00:00:00 [11:23:17] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1413) [11:23:17] Rogue channel: xx:xx:xx:xx:xx:xx -> 00:00:00:00:00:00: ProbeResp(seq=1414) Traceback (most recent call last): File "./krack-all-zero-tk.py", line 1018, in attack.run(strict_echo_test=args.strict_echo_test) File "./krack-all-zero-tk.py", line 950, in run if self.sock_rogue in sel[0]: self.handle_rx_roguechan() File "./krack-all-zero-tk.py", line 760, in handle_rx_roguechan if Dot11Beacon in p and ord(get_tlv_value(p, IEEE_TLV_TYPE_CHANNEL)) == self.netconfig.rogue_channel: TypeError: ord() expected string of length 1, but NoneType found [11:23:17] Closing hostapd and cleaning up ...

Smith31 avatar Jul 25 '18 07:07 Smith31