mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-02-17 17:43:06 -05:00
fragattacks: mention reboot as troubleshooting in README
This commit is contained in:
parent
f0c97b2446
commit
f6310c198d
@ -4,7 +4,7 @@
|
|||||||
|
|
||||||
This repository contains the **FragAttack** tool. It can test Wi-Fi clients and access points for **FR**agmentation
|
This repository contains the **FragAttack** tool. It can test Wi-Fi clients and access points for **FR**agmentation
|
||||||
and **AG**gregation Attacks (FragAttacks). These vulnerabilities affect _all_ protected Wi-Fi networks. You can
|
and **AG**gregation Attacks (FragAttacks). These vulnerabilities affect _all_ protected Wi-Fi networks. You can
|
||||||
view a summary of the [root cause and impact](fragattacks-slides-summary.pdf) of each vulnerability. There is also
|
view a _summary_ of the [root cause and impact](fragattacks-slides-summary.pdf) of each vulnerability. There is also
|
||||||
an overview of all [assigned CVEs](SUMMARY.md), a [2-page summary](attacks.pdf) of resulting attacks and preconditions,
|
an overview of all [assigned CVEs](SUMMARY.md), a [2-page summary](attacks.pdf) of resulting attacks and preconditions,
|
||||||
and you can view the presentation [handouts](fragattacks-slides.pdf). For more details see the USENIX Security
|
and you can view the presentation [handouts](fragattacks-slides.pdf). For more details see the USENIX Security
|
||||||
**[research paper](fragattacks.pdf)**.
|
**[research paper](fragattacks.pdf)**.
|
||||||
@ -554,43 +554,47 @@ APs only Free/NetBSD ones were affected).
|
|||||||
of the attack is identical to implementations that correctly parse such frames (for details see Section 3.6 and
|
of the attack is identical to implementations that correctly parse such frames (for details see Section 3.6 and
|
||||||
6.6 in the paper).
|
6.6 in the paper).
|
||||||
|
|
||||||
|
<a id="id-troubleshooting"></a>
|
||||||
## 7.10. Troubleshooting checklist
|
## 7.10. Troubleshooting checklist
|
||||||
|
|
||||||
In case the test tool doesn't appear to be working, check the following:
|
In case the test tool doesn't appear to be working, check the following:
|
||||||
|
|
||||||
1. Check that no other process is using the network card (e.g. kill your network manager).
|
1. Check that no other process is using the network card (e.g. kill your network manager).
|
||||||
|
|
||||||
2. Assure the device you are testing doesn't enter a sleep state (causing it to miss injected frames).
|
2. If everything worked previously, try unplugging your Wi-Fi dongle, restart your computer or virtual
|
||||||
|
machine, and then try again.
|
||||||
|
|
||||||
|
3. Assure the device you are testing doesn't enter a sleep state (causing it to miss injected frames).
|
||||||
I recommend running the test tool in [mixed mode](#id-mixed-mode) since this better handles clients
|
I recommend running the test tool in [mixed mode](#id-mixed-mode) since this better handles clients
|
||||||
that may go into a sleep state.
|
that may go into a sleep state.
|
||||||
|
|
||||||
3. Run the [injection tests](#id-injection-tests) to make sure injection is working properly.
|
4. Run the [injection tests](#id-injection-tests) to make sure injection is working properly.
|
||||||
|
|
||||||
4. Check that you machine isn't generating background traffic that interferes with the tests. In
|
5. Check that you machine isn't generating background traffic that interferes with the tests. In
|
||||||
particular, disable networking in your OS, manually kill your DHCP client/server, etc. See
|
particular, disable networking in your OS, manually kill your DHCP client/server, etc. See
|
||||||
also [Before every usage](#id-before-every-usage).
|
also [Before every usage](#id-before-every-usage).
|
||||||
|
|
||||||
5. Confirm that you are connecting to the correct network. Double-check `client.conf`.
|
6. Confirm that you are connecting to the correct network. Double-check `client.conf`.
|
||||||
|
|
||||||
6. Make sure the AP being tested is using (AES-)CCMP as the encryption algorithm. Other encryption
|
7. Make sure the AP being tested is using (AES-)CCMP as the encryption algorithm. Other encryption
|
||||||
algorithms such as TKIP or GCMP are not supported.
|
algorithms such as TKIP or GCMP are not supported.
|
||||||
|
|
||||||
7. If you updated the code using git, execute `./build.sh` and `./pysetup.sh` again (see [Prerequisites](#id-prerequisites)).
|
8. If you updated the code using git, execute `./build.sh` and `./pysetup.sh` again (see [Prerequisites](#id-prerequisites)).
|
||||||
In case the patched drivers got updated, remember to recompile them as well.
|
In case the patched drivers got updated, remember to recompile them as well.
|
||||||
|
|
||||||
8. If you are using a virtual machine, try to run the test tool from a live CD or USB instead.
|
9. If you are using a virtual machine, try to run the test tool from a live CD or USB instead.
|
||||||
|
|
||||||
9. Check that the tested device doesn't block ICMP ping requests. In case it doesn't reply to pings, you
|
10. Check that the tested device doesn't block ICMP ping requests. In case it doesn't reply to pings, you
|
||||||
can run tcpdump or wireshark on the device, or you can try any of the other methods listed in [No ICMP Support](#id-no-icmp).
|
can run tcpdump or wireshark on the device, or you can try any of the other methods listed in [No ICMP Support](#id-no-icmp).
|
||||||
|
|
||||||
10. Run the tool with the extra parameter `--debug 2` to get extra debug output from wpa_supplicant or
|
11. Run the tool with the extra parameter `--debug 2` to get extra debug output from wpa_supplicant or
|
||||||
hostapd and from the test tool itself.
|
hostapd and from the test tool itself.
|
||||||
|
|
||||||
11. Confirm using a second monitor interface that no other frames are sent in between fragments.
|
12. Confirm using a second monitor interface that no other frames are sent in between fragments.
|
||||||
For instance, I found that my Intel device sometimes sends Block Ack Response Action frames
|
For instance, I found that my Intel device sometimes sends Block Ack Response Action frames
|
||||||
between fragments, and this interfered with the defragmentation process of the device under test.
|
between fragments, and this interfered with the defragmentation process of the device under test.
|
||||||
|
|
||||||
12. Double-check that you are using modified firmware if needed for your wireless network card. The test
|
13. Double-check that you are using modified firmware if needed for your wireless network card. The test
|
||||||
tool already checks this automatically for `ath9k_htc` devices. The test tool also automatically checks
|
tool already checks this automatically for `ath9k_htc` devices. The test tool also automatically checks
|
||||||
if you are using modified drivers, though it might be good to manually double-check this on your
|
if you are using modified drivers, though it might be good to manually double-check this on your
|
||||||
specific Linux distribution.
|
specific Linux distribution.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user