diff --git a/research/README.md b/research/README.md index 628499f38..d833f2bfb 100644 --- a/research/README.md +++ b/research/README.md @@ -109,10 +109,11 @@ Install patched drivers: make -j 4 sudo make install -**TODO: Address any warnings during make install** - This compiles the drivers for all network cards supported by Linux. If you only want to compile the drivers for network cards we explicitly tested, use `make defconfig-experiments` instead. +During the install command you may get several warnings containing `needs unknown symbol`. You can +ignore these warning as long they do not contain the `/lib/modules/*/updates/` directory and the +compiled drivers are working. Now install patched `ath9k_htc` firmware: @@ -417,7 +418,7 @@ presence of a certain vulnerability class, there is no need to test the other at | `ping I,F,BE,E` | In case the new key is installed relatively late. | `ping I,E,F,AE --rekey-plain` | If the device performs the rekey handshake in plaintext. | `ping I,E,F,AE --rekey-req --rekey-plain`| Same as above, and actively request a rekey as client. -| `ping I,E,F,AE --rekey-early-install` | Install the new key before sending message 4 as an AP. **TODO: Test again against Windows.** +| `ping I,E,F,AE --rekey-early-install` | Install the new key before sending message 4 as an AP. | `ping I,F,BE,AE --freebsd` | Mixed key attack against FreeBSD. |
*Cache attacks (ยง5)*
| `ping I,E,R,AE --freebsd [--full-reconnect]` | Cache attack specific to FreeBSD implementations. @@ -745,10 +746,6 @@ I tested the Intel AX200 as well and found that it is _not_ compatible with the crashes after sending a fragmented frame. If an Intel developer is reading this, please update the firmware and make it possible to inject fragmented frames. -### Injection mode - -**TODO: Device that were tested as being an AP while using another one to inject? Broadcom of macOS, Intel AX200?** - ## 9.8. Hwsim mode details **Warning**: *this is currently an experimental mode, only use it for research purposes.*