From 56a0d40b3bc26c0a75c01f043a3fae662bc43894 Mon Sep 17 00:00:00 2001 From: Mathy Vanhoef Date: Wed, 13 Jan 2021 04:23:24 +0400 Subject: [PATCH] fragattack: tweak to README --- research/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/research/README.md b/research/README.md index 6ef6a952b..3ed51e196 100644 --- a/research/README.md +++ b/research/README.md @@ -24,7 +24,7 @@ the paper also briefly discusses the applicability of the attacks against WEP. - This version is based on hostap commit `a337c1d7c` ("New TWT operations and attributes to TWT Setup and Nudge"). -- Added instructions on how to test WPA3/SAE devices using either the hunting-and-pecking or hash-to-element method. +- Added instructions on how to test WPA3/SAE devices using either the hunting-and-pecking or hash-to-element method. This also implies that Management Frame Protection (MFP) is supported by the test tool. - Added a clarification to this README on how to use tcpdump to verify the result of certain tests. @@ -37,7 +37,7 @@ the paper also briefly discusses the applicability of the attacks against WEP. - Fixed injection of fragmented frames when using ath9k_htc dongles in combination with 802.11n. -- The python `requirements.txt` file now references a patched Scapy version to work around an +- The python `requirements.txt` file now references a patched scapy version to address an [incompatibility](https://github.com/secdev/scapy/commit/46fa40fde4049ad7770481f8806c59640df24059) with Python 3.9. - Fixed the `ping-frag-sep` test. Previously it behaved like `ping-frag-sep --pn-per-qos`. Note that this test