fragattack: README fixes are tests on live Kali

This commit is contained in:
Mathy Vanhoef 2020-08-08 09:42:23 +04:00
parent 91e9efcf8f
commit dd44b0103a

View File

@ -74,19 +74,22 @@ and using the tool against a known-vulnerable implementation to confirm the tool
The test tool was tested on Kali Linux and Ubuntu 20.04. To install the required dependencies, execute: The test tool was tested on Kali Linux and Ubuntu 20.04. To install the required dependencies, execute:
# Kali Linux and Ubuntu # Kali Linux and Ubuntu:
sudo apt-get update sudo apt-get update
sudo apt-get install libnl-3-dev libnl-genl-3-dev libnl-route-3-dev libssl-dev \ sudo apt-get install libnl-3-dev libnl-genl-3-dev libnl-route-3-dev libssl-dev \
libdbus-1-dev git pkg-config build-essential macchanger net-tools python3-venv \ libdbus-1-dev git pkg-config build-essential macchanger net-tools python3-venv \
aircrack-ng firmware-ath9k-htc rfkill aircrack-ng rfkill
# Kali Linux:
sudo apt-get install firmware-atheros
# Ubuntu/Debian:
sudo apt-get install firmware-ath9k-htc
Now clone this repository, build the tools, and configure a virtual python3 environment: Now clone this repository, build the tools, and configure a virtual python3 environment:
# **TODO: replace with real HTTP unauthenticated link on release** # **TODO: replace with real HTTP unauthenticated link on release**
git clone https://gitlab.com/aconf/wifi.git fragattack --recursive git clone https://gitlab.com/aconf/wifi.git fragattack --recursive
cd fragattack cd fragattack/research
./build.sh ./build.sh
cd research
python3 -m venv venv python3 -m venv venv
source venv/bin/activate source venv/bin/activate
pip install wheel pip install wheel
@ -621,8 +624,8 @@ If you also want to test the retransmission behaviour of `wlan0` in mixed mode y
In case you do not have a second network card, you can execute a partial mixed mode injection test In case you do not have a second network card, you can execute a partial mixed mode injection test
using: using:
./fragattack wlan0 ping --inject-selftest ./fragattack wlan0 ping --inject-test[-postauth] self
./fragattack wlan0 ping --inject-selftest --ap ./fragattack wlan0 ping --inject-test[-postauth] self --ap
Unfortunately, the above tests can only test if the kernel overwrites fields of injected frames, Unfortunately, the above tests can only test if the kernel overwrites fields of injected frames,
it cannot test whether the firmware or wireless chip itself overwrites fields. it cannot test whether the firmware or wireless chip itself overwrites fields.