diff --git a/research/README.md b/research/README.md index ff725b115..08cfd97f9 100644 --- a/research/README.md +++ b/research/README.md @@ -22,13 +22,22 @@ the paper also briefly discusses the applicability of the attacks against WEP. **Version 1.2 (? November 2020)**: -- Clarified that all commands can test both clients and APs unless noted otherwise. +- Tool will automatically quit after a test completed or timed out. -- Clarified the description of cache attacks, Broadcast fragment, and A-MSDU EAPOL attack tests in this README. +- Tool detects if the 4-way handshake is looping or if there is not replly to a rekey request (`--rekey-req`). + +- When using an external DHCP server, the tool will now send rekey EAPOL frames with as destination address + the AP (instead of the DHCP server). + +- When acting as a client, the tool will send EAPOL Rekey Request with a Replay Counter of one instead of zero. - Debug output now shows the correct (group) key when encrypting broadcast/multicast frames. This does not influence any test results, it only changes the output of the test tool. +- Clarified that all commands can test both clients and APs unless noted otherwise. + +- Clarified the description of cache attacks, Broadcast fragment, and A-MSDU EAPOL attack tests in this README. + **Version 1.1 (20 October 2020)**: - Fixed a bug where the command `ping I,E,D` would send a normal encrypted ping request. It now sends an @@ -157,7 +166,7 @@ to manually copy `htc_7010.fw` and `htc_9271.fw` to the appropriate directory. After installing the patched drivers and firmware you must unplug your Wi-Fi dongles and **reboot your system**. The above instructions have to be executed again if your -Linux kernel gets updated or if the driver patches get updated. +Linux kernel gets updated or if the patched drivers get updated. Note that even when your device works out of the box, I still recommend to install the modified drivers, as this assures there are no unexpected regressions in kernel and driver code. @@ -524,7 +533,7 @@ All commands work against both clients and APs unless noted otherwise. | `ping I,E,F,AE` | Variant if no data frames are accepted during the rekey handshake. | `ping I,E,F,AE --rekey-plain` | If the device performs the rekey handshake in plaintext. | `ping I,E,F,AE --rekey-plain --rekey-req` | Same as above, and actively request a rekey as client. -| `ping I,E,F,AE --rekey-early-install` | Install the new key before receiving/sending message 4. +| `ping I,E,F,AE --rekey-early-install` | Install the new key after sending message 3 of the 4-way handshake. | `ping I,F,BE,AE --freebsd` | Mixed key attack against FreeBSD or similar implementations. |