mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
fragattack: new testcase in README
This commit is contained in:
parent
c79a53420a
commit
fc1d0aaefd
@ -538,6 +538,7 @@ All commands work against both clients and APs unless noted otherwise.
|
||||
| `ping I,E,F,AE --rekey-plain` | If the device performs the rekey handshake in plaintext.
|
||||
| `ping I,E,F,AE --rekey-plain --rekey-req` | Same as above, and actively request a rekey as client.
|
||||
| `ping I,E,F,AE --rekey-early-install` | Install the new key after sending message 3 of the 4-way handshake.
|
||||
| `ping I,E,F,E [--rekey-pl] [--rekey-req]` | Same as above 4 tests, but with longer delay before 2nd fragment.
|
||||
| `ping I,F,BE,AE --freebsd` | Mixed key attack against FreeBSD or similar implementations.
|
||||
| <div align="center">*[Cache attacks (§5)](#id-extended-cache)*</div>
|
||||
| `ping I,E,R,AE --freebsd [--full-reconnect]` | Cache attack specific to FreeBSD implementations.
|
||||
@ -599,6 +600,10 @@ these alternative mixed key attack tests. Some remarks:
|
||||
a pairwise session rekey. To reliably test these clients, add the `--rekey-early-install` parameter. This test
|
||||
is not meaningfull against APs.
|
||||
|
||||
- `ping I,E,F,E [--rekey-pl] [--rekey-req]`: This test variant is the same as the above four, except that the second
|
||||
fragment is send 1 second after the 4-way handshake. This can be important because in a low number of devices there
|
||||
is a small delay the new key is installed. Note that `--rekey-pl` is a shorthand of `--rekey-plain`.
|
||||
|
||||
Finally, in case the test `ping-frag-sep` doesn't succeed, you should try the following mixed key attack test:
|
||||
|
||||
- `ping I,F,BE,AE --freebsd`: This essentially performs the rekey handshake against a FreeBSD implementation, or
|
||||
|
Loading…
Reference in New Issue
Block a user