2020-03-04 06:36:52 -05:00
|
|
|
ctrl_interface=wpaspy_ctrl
|
2020-02-27 07:06:53 -05:00
|
|
|
|
2020-12-18 15:30:29 -05:00
|
|
|
# WPA3/SAE: support both hunting-and-pecking loop and hash-to-element
|
|
|
|
sae_pwe=2
|
|
|
|
|
|
|
|
# WPA2 home network
|
2020-02-27 07:06:53 -05:00
|
|
|
network={
|
2020-08-08 01:43:04 -04:00
|
|
|
ssid="testnetwork"
|
|
|
|
psk="abcdefgh"
|
2020-05-23 20:39:15 -04:00
|
|
|
|
|
|
|
pairwise=CCMP
|
|
|
|
#group=CCMP
|
2020-11-22 18:19:29 -05:00
|
|
|
|
2020-12-18 12:18:09 -05:00
|
|
|
# Might be useful in very noisy environments
|
|
|
|
#disable_ht=1
|
2021-05-07 05:30:47 -04:00
|
|
|
|
|
|
|
# Some network cards don't properly support injection on non-20MHz
|
|
|
|
# channels. In that case uncomment this line to disable 40 MHz.
|
|
|
|
#disable_ht40=1
|
2020-02-27 07:06:53 -05:00
|
|
|
}
|
2020-02-29 15:56:41 -05:00
|
|
|
|
2020-12-18 15:30:29 -05:00
|
|
|
# WPA3 home network
|
|
|
|
network={
|
|
|
|
ssid="test-wpa3"
|
|
|
|
psk="abcdefgh"
|
|
|
|
|
|
|
|
ieee80211w=1
|
|
|
|
key_mgmt=SAE
|
|
|
|
}
|
|
|
|
|
2020-05-23 20:39:15 -04:00
|
|
|
# Enterprise network
|
2020-02-29 15:56:41 -05:00
|
|
|
network={
|
2020-05-23 20:39:15 -04:00
|
|
|
ssid="peaptest"
|
|
|
|
key_mgmt=WPA-EAP
|
|
|
|
eap=PEAP
|
|
|
|
anonymous_identity="not anonymous"
|
|
|
|
identity="user"
|
|
|
|
phase2="auth=MSCHAPV2"
|
|
|
|
password="password"
|
2020-02-29 15:56:41 -05:00
|
|
|
|
2020-05-23 20:39:15 -04:00
|
|
|
pairwise=CCMP
|
|
|
|
#group=CCMP
|
2020-02-29 15:56:41 -05:00
|
|
|
}
|
2020-04-22 19:13:32 -04:00
|
|
|
|
2020-12-18 15:30:29 -05:00
|
|
|
# EAP-PWD with dynamic WEP keys (for research purposes)
|
2020-04-22 19:13:32 -04:00
|
|
|
network={
|
|
|
|
ssid="weptests"
|
|
|
|
key_mgmt=IEEE8021X
|
|
|
|
eap=PWD
|
|
|
|
identity="user"
|
|
|
|
password="password"
|
2020-05-23 20:39:15 -04:00
|
|
|
|
|
|
|
pairwise=CCMP
|
|
|
|
#group=CCMP
|
2020-04-22 19:13:32 -04:00
|
|
|
}
|