mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-24 16:28:23 -05:00
56 lines
929 B
Plaintext
56 lines
929 B
Plaintext
ctrl_interface=wpaspy_ctrl
|
|
|
|
# WPA3/SAE: support both hunting-and-pecking loop and hash-to-element
|
|
sae_pwe=2
|
|
|
|
# WPA2 home network
|
|
network={
|
|
ssid="testnetwork"
|
|
psk="abcdefgh"
|
|
|
|
pairwise=CCMP
|
|
#group=CCMP
|
|
|
|
# Some network cards don't properly support injection on non-20MHz
|
|
# channels. In that case uncomment this line to disable 40 MHz.
|
|
#disable_ht40=1
|
|
|
|
# Might be useful in very noisy environments to disable high bitrates.
|
|
#disable_ht=1
|
|
}
|
|
|
|
# WPA3 home network
|
|
network={
|
|
ssid="test-wpa3"
|
|
psk="abcdefgh"
|
|
|
|
ieee80211w=1
|
|
key_mgmt=SAE
|
|
}
|
|
|
|
# Enterprise network
|
|
network={
|
|
ssid="peaptest"
|
|
key_mgmt=WPA-EAP
|
|
eap=PEAP
|
|
anonymous_identity="not anonymous"
|
|
identity="user"
|
|
phase2="auth=MSCHAPV2"
|
|
password="password"
|
|
|
|
pairwise=CCMP
|
|
#group=CCMP
|
|
}
|
|
|
|
# EAP-PWD with dynamic WEP keys (for research purposes)
|
|
network={
|
|
ssid="weptests"
|
|
key_mgmt=IEEE8021X
|
|
eap=PWD
|
|
identity="user"
|
|
password="password"
|
|
|
|
pairwise=CCMP
|
|
#group=CCMP
|
|
}
|