diff --git a/research/README.md b/research/README.md index ee4c0b2ef..3f88c4721 100644 --- a/research/README.md +++ b/research/README.md @@ -512,8 +512,8 @@ presence of a certain vulnerability class, there is no need to test the other at | `eapol-inject 00:11:22:33:44:55` | Test if AP forwards EAPOL frames before authenticated (use tcpdump). | `eapol-inject-large 00:11:22:33:44:55` | Make AP send fragmented frames by EAPOL injection (use tcpdump). |
*No fragmentation support attack (§6.8)*
-| `ping I,E,D` | Send ping inside an encrypted first fragment (no 2nd fragment). | `ping I,D,E` | Send ping inside an encrypted second fragment (no 1st fragment). +| `ping I,E,D` | Send ping inside an encrypted first fragment (no 2nd fragment). ## 8.1. A-MSDU attack tests (§3 -- CVE-2020-24588) diff --git a/research/fragattack.py b/research/fragattack.py index b0f25a935..69971557c 100755 --- a/research/fragattack.py +++ b/research/fragattack.py @@ -8,6 +8,8 @@ import glob, importlib, argparse from fraginternals import * +FRAGVERSION = "1.1 - 20 October 2020" + # ----------------------------------- Main Function ----------------------------------- def cleanup(): @@ -165,7 +167,7 @@ def args2msdu(args): return None if __name__ == "__main__": - parser = argparse.ArgumentParser(description="Test for fragmentation vulnerabilities.") + parser = argparse.ArgumentParser(description=f"Test for fragmentation vulnerabilities (v{FRAGVERSION}).") parser.add_argument('iface', help="Interface to use for the tests.") parser.add_argument('testname', help="Name or identifier of the test to run.") parser.add_argument('actions', nargs='?', help="Optional textual descriptions of actions") @@ -240,6 +242,7 @@ if __name__ == "__main__": change_log_level(-options.debug) # Now start the tests --- TODO: Inject Deauths before connecting with client... + log(STATUS, f"This is fragattack version {FRAGVERSION}.") if options.ap: daemon = Authenticator(options) else: