mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 00:38:24 -05:00
2ccd42033a
This uses fragmented IPv4 packets to perfrom (variants of) the test "ping BP" without needing to run a packet capture on the victim device. This is accomplished by sending the first IPv4 fragment of a ping request before authenticating, and the second IPv4 fragment after authenticating. If the device is vulnerable, it should replay with a ping response. Note that both ping IPv4 fragments are sent in a normal non-fragmented Wi-Fi frame. The test was confirmed to work against a Huawei MRD-LZ1F (Huawei Y6 2019). |
||
---|---|---|
.. | ||
ath9k-firmware | ||
libwifi | ||
build.sh | ||
client.conf | ||
disable-hwcrypto.sh | ||
droptraffic.sh | ||
fragattack.py | ||
fraginternals.py | ||
hostapd.conf | ||
hwsim.sh | ||
pysetup.sh | ||
requirements.txt | ||
scan.sh | ||
test-injection.py | ||
tests_attacks.py | ||
tests_common.py | ||
tests_experimental.py | ||
tests_old.py | ||
tests_qca.py | ||
wpaspy.py |