diff --git a/research/README.md b/research/README.md
index ee4c0b2ef..3f88c4721 100644
--- a/research/README.md
+++ b/research/README.md
@@ -512,8 +512,8 @@ presence of a certain vulnerability class, there is no need to test the other at
| `eapol-inject 00:11:22:33:44:55` | Test if AP forwards EAPOL frames before authenticated (use tcpdump).
| `eapol-inject-large 00:11:22:33:44:55` | Make AP send fragmented frames by EAPOL injection (use tcpdump).
|
*No fragmentation support attack (§6.8)*
-| `ping I,E,D` | Send ping inside an encrypted first fragment (no 2nd fragment).
| `ping I,D,E` | Send ping inside an encrypted second fragment (no 1st fragment).
+| `ping I,E,D` | Send ping inside an encrypted first fragment (no 2nd fragment).
## 8.1. A-MSDU attack tests (§3 -- CVE-2020-24588)
diff --git a/research/fragattack.py b/research/fragattack.py
index b0f25a935..69971557c 100755
--- a/research/fragattack.py
+++ b/research/fragattack.py
@@ -8,6 +8,8 @@
import glob, importlib, argparse
from fraginternals import *
+FRAGVERSION = "1.1 - 20 October 2020"
+
# ----------------------------------- Main Function -----------------------------------
def cleanup():
@@ -165,7 +167,7 @@ def args2msdu(args):
return None
if __name__ == "__main__":
- parser = argparse.ArgumentParser(description="Test for fragmentation vulnerabilities.")
+ parser = argparse.ArgumentParser(description=f"Test for fragmentation vulnerabilities (v{FRAGVERSION}).")
parser.add_argument('iface', help="Interface to use for the tests.")
parser.add_argument('testname', help="Name or identifier of the test to run.")
parser.add_argument('actions', nargs='?', help="Optional textual descriptions of actions")
@@ -240,6 +242,7 @@ if __name__ == "__main__":
change_log_level(-options.debug)
# Now start the tests --- TODO: Inject Deauths before connecting with client...
+ log(STATUS, f"This is fragattack version {FRAGVERSION}.")
if options.ap:
daemon = Authenticator(options)
else: