mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
fragattack: tweaked troubleshooting steps
This commit is contained in:
parent
d7718bc6f6
commit
2f4a6cb56e
@ -529,20 +529,20 @@ In case the test tool doesn't appear to be working, check the following:
|
|||||||
|
|
||||||
8. If you are using a virtual machine, try to run the test tool from a live CD or USB instead.
|
8. If you are using a virtual machine, try to run the test tool from a live CD or USB instead.
|
||||||
|
|
||||||
9. Confirm using a second monitor interface that no other frames are sent in between fragments.
|
9. Check that the tested device doesn't block ICMP ping requests. In case it doesn't reply to pings, you
|
||||||
|
can run tcpdump or wireshark on the device, or you can try any of the other methods listed in [No ICMP Support](#id-no-icmp).
|
||||||
|
|
||||||
|
10. Run the tool with the extra parameter `--debug 2` to get extra debug output from wpa_supplicant or
|
||||||
|
hostapd and from the test tool itself.
|
||||||
|
|
||||||
|
11. Confirm using a second monitor interface that no other frames are sent in between fragments.
|
||||||
For instance, I found that my Intel device sometimes sends Block Ack Response Action frames
|
For instance, I found that my Intel device sometimes sends Block Ack Response Action frames
|
||||||
between fragments, and this interfered with the defragmentation process of the device under test.
|
between fragments, and this interfered with the defragmentation process of the device under test.
|
||||||
|
|
||||||
10. Check that you are using modified drivers if needed for your wireless network card.
|
12. Double-check that you are using modified firmware if needed for your wireless network card. The test
|
||||||
If you updated your kernel, you will need to recompile and reinstall the drivers.
|
tool already checks this automatically for `ath9k_htc` devices. The test tool also automatically checks
|
||||||
|
if you are using modified drivers, though it might be good to manually double-check this on your
|
||||||
11. Check that you are using modified firmware if needed for your wireless network card.
|
specific Linux distribution.
|
||||||
|
|
||||||
12. Check that the tested device doesn't block ICMP ping requests. In case it doesn't reply to pings, you
|
|
||||||
can run tcpdump or wireshark on the device, or you can try any of the other methods listed in [No ICMP Support](#id-no-icmp).
|
|
||||||
|
|
||||||
13. Run the tool with the extra parameter `--debug 2` to get extra debug output from wpa_supplicant or
|
|
||||||
hostapd and from the test tool itself.
|
|
||||||
|
|
||||||
<a id="id-extended-tests"></a>
|
<a id="id-extended-tests"></a>
|
||||||
# 8. Extended Vulnerability Tests
|
# 8. Extended Vulnerability Tests
|
||||||
|
Loading…
Reference in New Issue
Block a user