mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 10:18:21 -05:00
fragattack: tweaked troubleshooting steps
This commit is contained in:
parent
d7718bc6f6
commit
2f4a6cb56e
@ -529,20 +529,20 @@ In case the test tool doesn't appear to be working, check the following:
|
||||
|
||||
8. If you are using a virtual machine, try to run the test tool from a live CD or USB instead.
|
||||
|
||||
9. Confirm using a second monitor interface that no other frames are sent in between fragments.
|
||||
9. Check that the tested device doesn't block ICMP ping requests. In case it doesn't reply to pings, you
|
||||
can run tcpdump or wireshark on the device, or you can try any of the other methods listed in [No ICMP Support](#id-no-icmp).
|
||||
|
||||
10. Run the tool with the extra parameter `--debug 2` to get extra debug output from wpa_supplicant or
|
||||
hostapd and from the test tool itself.
|
||||
|
||||
11. Confirm using a second monitor interface that no other frames are sent in between fragments.
|
||||
For instance, I found that my Intel device sometimes sends Block Ack Response Action frames
|
||||
between fragments, and this interfered with the defragmentation process of the device under test.
|
||||
|
||||
10. Check that you are using modified drivers if needed for your wireless network card.
|
||||
If you updated your kernel, you will need to recompile and reinstall the drivers.
|
||||
|
||||
11. Check that you are using modified firmware if needed for your wireless network card.
|
||||
|
||||
12. Check that the tested device doesn't block ICMP ping requests. In case it doesn't reply to pings, you
|
||||
can run tcpdump or wireshark on the device, or you can try any of the other methods listed in [No ICMP Support](#id-no-icmp).
|
||||
|
||||
13. Run the tool with the extra parameter `--debug 2` to get extra debug output from wpa_supplicant or
|
||||
hostapd and from the test tool itself.
|
||||
12. Double-check that you are using modified firmware if needed for your wireless network card. The test
|
||||
tool already checks this automatically for `ath9k_htc` devices. The test tool also automatically checks
|
||||
if you are using modified drivers, though it might be good to manually double-check this on your
|
||||
specific Linux distribution.
|
||||
|
||||
<a id="id-extended-tests"></a>
|
||||
# 8. Extended Vulnerability Tests
|
||||
|
Loading…
Reference in New Issue
Block a user