fragattacks/research/client.conf

56 lines
929 B
Plaintext
Raw Normal View History

2020-03-04 06:36:52 -05:00
ctrl_interface=wpaspy_ctrl
# WPA3/SAE: support both hunting-and-pecking loop and hash-to-element
sae_pwe=2
# WPA2 home network
network={
ssid="testnetwork"
psk="abcdefgh"
2020-05-23 20:39:15 -04:00
pairwise=CCMP
#group=CCMP
2020-11-22 18:19:29 -05:00
# Some network cards don't properly support injection on non-20MHz
# channels. In that case uncomment this line to disable 40 MHz.
#disable_ht40=1
# Might be useful in very noisy environments to disable high bitrates.
#disable_ht=1
}
# WPA3 home network
network={
ssid="test-wpa3"
psk="abcdefgh"
ieee80211w=1
key_mgmt=SAE
}
2020-05-23 20:39:15 -04:00
# Enterprise network
network={
2020-05-23 20:39:15 -04:00
ssid="peaptest"
key_mgmt=WPA-EAP
eap=PEAP
anonymous_identity="not anonymous"
identity="user"
phase2="auth=MSCHAPV2"
password="password"
2020-05-23 20:39:15 -04:00
pairwise=CCMP
#group=CCMP
}
# EAP-PWD with dynamic WEP keys (for research purposes)
network={
ssid="weptests"
key_mgmt=IEEE8021X
eap=PWD
identity="user"
password="password"
2020-05-23 20:39:15 -04:00
pairwise=CCMP
#group=CCMP
}