fragattacks/research
2020-05-25 01:10:58 +04:00
..
ath9k-firmware fragattack: ath9k_htc firmware to preserve sequence numbers 2020-03-01 04:56:26 -05:00
libwifi@3aa69b2ccb fragattack: workaround for scapy bug 2020-05-22 21:13:30 +04:00
build.sh fragattack: update to README and small script fix 2020-04-16 00:56:34 -04:00
client.conf fragattacks: draft version of README 2020-05-24 04:39:15 +04:00
deinit.sh fragattack: tests and results on forcing frame fragmentation 2020-02-29 15:56:41 -05:00
DEVICES.md fragattacks: draft version of README 2020-05-24 04:39:15 +04:00
fragattack.py fragattack: print message if a test timed out 2020-05-25 01:10:58 +04:00
hostapd.conf fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
hwcrypto.sh fragattack: script to turn hardware encryption on or off 2020-03-07 21:10:55 -05:00
hwsim.sh fragattacks: draft version of README 2020-05-24 04:39:15 +04:00
post-analysis.py fragattack: netbsd force fragment experiments 2020-03-01 19:03:08 -05:00
README.md fragattacks: draft version of README 2020-05-24 04:39:15 +04:00
requirements.txt fragattack: move requirements.txt to hostapd directory 2020-05-22 21:43:35 +04:00
scan.sh fragattacks: draft version of README 2020-05-24 04:39:15 +04:00
start_ap.sh fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
start_sta2.sh fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
start_sta.sh fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
test-injection.py fragattack: update test-inject to perform self-test as well 2020-05-22 17:46:51 +04:00
tests_qca.py fragattacks: various improvements to ping test for experiments 2020-04-23 10:19:14 -04:00
wpaspy.py fragattack: script to inject encrypted fragmented frames 2020-02-27 07:07:19 -05:00

This repository contains scripts to test for Wi-Fi fragmentation and aggregation vulnerabilities.

Usage

Supported Network Cards

Only specific wireless network cards are supported. This is because some network cards may overwrite the sequence number of injected frames, may overwrite the fragment number, or reorder frames of different priority, and this interferes with our scripts (i.e. our script might incorrectly say a device is secure although it's not). We have confirmed that the following network cards work properly with our scripts:

Network Card USB injection mode mixed mode hwsim mode (experimental)
Intel AX200 No ? ? ?
Intel Wireless-AC 8265 No yes patched driver as client
Intel Wireless-AC 3160 No yes patched driver/firmware as client
Technoethical N150 HGA Yes patched driver/firmware patched driver/firmware patched driver/firmware
TP-Link TL-WN722N v1.x Yes patched driver/firmware patched driver/firmware patched driver/firmware
Alfa AWUS036NHA Yes patched driver/firmware patched driver/firmware patched driver/firmware
Alfa AWUS036ACM Yes ? ? ?
Alfa AWUS036ACH Yes ? ? ?
Netgear WN111v2 Yes yes patched driver yes

The three last colums signify:

  1. Injection mode: whether the network card can be used as a second interface to inject frames in [injection mode].

  2. hwsim mode: whether the network card can be used in [hwsim mode].

  3. Mixed mode: whether the network card can be used in [mixed mode].

We recommend the use of the Technoethical N150 HGA in either injection mode or mixed mode. It requires the use of a patched driver and firmware, but since it's a USB dongle this can be configured inside a virtual machine. If you are unable to find one of the above devices, you can search for [alternative devices] that have a high chance of also working.

Prerequisites

Our scripts were tested on Kali Linux, Ubuntu 18.04, Arch Linux, and Manjaro Linux. To install the required dependencies, execute:

# Kali Linux and Ubuntu
apt-get update
apt-get install libnl-3-dev libnl-genl-3-dev pkg-config libssl-dev net-tools git

# Arch Linux and Manjaro Linux
pacman -S macchanger

Now clone this repository, build the tools, and configure a virtual python3 environment:

git clone git@bitbucket.org:vanhoefm/fragattack-scripts.git --recursive
cd fragattack-scripts
./build.sh
cd research
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt

The above instructions only have to be executed once.

Before every usage

Every time you want to use the script, you first have to load the virtual python environment as root. This can be done using:

cd fragattack-scripts/research
sudo su
source venv/bin/activate

You should now disable Wi-Fi in your network manager so it will not interfere with our scripts.

Our script can test both clients and APs:

  • Testing APs: configure the AP you want to test by editing research/client.conf. This is a standard wpa_supplicant configuration file, see the [hostap documentation] on how to edit it.

  • Testing clients: you must execute the script with the extra --ap parameter. This instructs the script into creating an AP with as name testnetwork and password abcdefgh. Connect to this network with the client you want to test. By default the client must request an AP using DHCP. To edit properties of the created AP, such as the channel it's created on, you can edit research/hostapd.conf.

Testing Modes

Injection Mode

This mode requires two devices: one will act as an AP or the client, and the other will be used to inject frames. Execute the script in this mode using:

./fragattack wlan0 --inject wlan1 [--ap] $COMMAND

Here interface wlan0 will act as a legitimate client or AP, and wlan1 will be used to inject frames. For wlan0, any card that supports normal client or AP mode on Linux can be used. For wlan1, a card must be used that supports injection mode according to [Supported Network Cards].

Mixed mode

This mode requires only one device. This disadvantage is that this mode requires a patched driver and/or firmware, and that only a small amount of devices are supported. Execute the script in this mode using:

./fragattack wlan0 [--ap] $COMMAND

Compile and install backports.

Hwsim mode (experimental)

TODO: This mode isn't useful for Intel/mvm since it's too unreliable... Bootable Live CD is better!

This mode requires only one device. The disadvantage is that this mode is the least reliable:

  • Frames are handled slower, possibly causing the tested client/AP to timeout during authentication or association.

  • When injeting frames, they may be retransmitted even though an acknowledgement was recieved. This will further slightly slowdown the handling of frames.

  • Frames are not properly acknowledged depending on the wireless network card, which causes some tested clients or APs to disconnect during authentication or association.

Nevertheless, the advantage is that is mode can, depending on the network card, be used without patches to the driver and/or firmware. Before using this mode, create two virtual network cards:

./hwsim.sh

This will output the two created virtual "hwsim" interfaces, for example wlan1 and wlan2. Then search for the channel of the AP you want to test, and put the real network card on this channel: TODO: recommend channel 1-13? TODO: do we also support AP mode? I suppose for patched ath9k_htc it does work.

./scan.sh wlan0
iw wlan0 set type monitor
ifconfig wlan0 up
iw wlan0 set channel 11
**TODO: sudo iw wlan0 set monitor otherbss. Does airmon-ng handle this better? Move to general section?**

You can now start the script as follows:

./fragattack wlan0 --hwsim wlan1,wlan2 [--ap] $COMMAND

After the script executed, you can directly run it again with a new command.

Testing for Vulnerabilities

We recommend executing the following tests. The tests marked in bold correspond to vulnerabilities, and the other tests are useful to understand the behaviour of the device under test.

Test Command Short description
Normal ping ping I,E Send a normal ping
Fragmented ping ping I,E,E Send a fragmented ping
Fragmentation timeout ping I,E,E --delay 5 Send a fragmented ping with a 5s delay between fragments
Non-consecutive ping I,E,E --inc-pn 2 Send a fragmented ping with non-consecutive packet numbers.
Seperator ping-frag-sep Send a fragmented ping with fragments separated by a normal frame
Mixed key ping I,R,BE,AE As client wait for rekey and as AP force rekey, then encrypt fragments under different keys.
ping I,R,BE,AE --pn-per-qos Same as above, except it also work when the device doesn't accept non-consecutive fragments.
Cache Poison ping I,E,C,AE Inject a fragment, as client reassociate and as AP force tested client to reconnect, then inject second fragment.
ping I,E,C,E Same as above, except there is a longer delay before sending the second fragment.
ping I,E,C,AE --full-reconnect Inject a fragment, as client reconnect and as AP force tested client to reconnect, then inject second fragment.
ping I,E,C,E --full-reconnect Same as above, except there is a longer delay before sending the second fragment.
A-MSDU ping I,E --msdu Send a normal ping encapsulated in a normal A-MSDU frame.
ping I,E,E --msdu Send a normal ping an a fragmented A-MSDU frame.
Mixed Plain/Enc ping I,E,P Send a fragmented ping: first fragment encrypted, second fragment in plaintext.
ping I,P,E Send a fragmented ping: first fragment in plaintext, send fragment encrypted.
ping I,P Send a plaintext ping.
ping I,P,P Send a fragmented ping: both fragments are sent in plaintext.
Linux Plain/Enc linux-plain Mixed plaintext/encrypted fragmentation attack specific to Linux.
EAPOL A-MSDU eapol-msdu BB Send A-MSDU frame disguised as EAPOL frame. Run tcpdump on target to check if vulnerable.
eapol-msdu I,CC Same as above, except the frame is injected after being connected and obtaining an IP.
eapol-msdu M,BB Send a malformed A-MSDU frame disguised as EAPOL frame. Use tcpdump to check if vulnerable.
eapol-msdu M,I,CC Same as above, except the frame is injected after being connected and obtaining an IP.
MacOS Plain Inject macos BB Fragmented EAPOL attack (notably works against MacOS). Run tcpdump on target to check if vulnerable.
Broadcast ping ping I,D,P --bcast Send ping inside the second plaintext fragment of a broadcast Wi-Fi frame (no 1st fragment is sent).

Optionally you can also run more advanced tests. These have a lower chance of uncovering vulnerabilities, but against more exotic implementations that might work (while the above tests could fail).

Test Command Short description
Mixed key ping I,E,R,AE Inspired by MediaTek case
ping I,E,R,AE --rekey-plaintext Mixed key attack against MediaTek
ping I,E,R,AE --rekey-request --rekey-plaintext Mixed key attack against MediaTek
ping I,E,R,AE --rekey-early-install TODO
ping I,R,BE,AE --freebsd Mixed key attack against FreeBSD
Mixed Plain/Enc ping I,E,P,E Send a fragmented ping: first fragment encrypted, second plaintext, third encrypted.
linux-plain 3 Mixed plaintext/encrypted fragmentation attack, decoy fragment is sent using QoS TID 3.
EAPOL A-MSDU eapol-msdu SS
eapol-msdu AA
MacOS Plain Inject macos CC Fragmented EAPOL attack (notably works against MacOS). Run tcpdump on target to check if vulnerable.
Broadcast ping ping I,P,P --bcast Send ping inside two plaintext fragments of a broadcast Wi-Fi frame.
ping I,P --bcast Send ping inside a plaintext broadcast Wi-Fi frame.

Details remarks:

  • Fragmentation timeout: this test is used to check the maximum accepted delay between two fragments. If the default test doesn't work, try with --delay 2 or lower. In case the maximum accepted delay is low, this may impact other tests. All fragments sent in other tests must be sent within the maximum delay, otherwise the test will automatically fail (and you might conclude a device isn't. vulnerable to an attack even though it might be.

  • When running the mixed key test against an AP, the AP must be configured to regularly renew the PTK by executing a new 4-way handshake (e.g. every 30 seconds or minute). Against a low number of APs, the client can also request the AP to renew the PTK. This can be done by adding the --rekey-request parameter.

    Home routers with a MediaTek driver will perform the rekey handshake in plaintext. To test these devices, also add the --rekey-plaintext parameter.

    Against unknown devices, the PTK will be installed too early. To test these devices, add the --rekey-early-install parameter and retry the test.

In case you are testing a device which should be vulnerable, but the script doesn't detect that it's vulnerable, double check the following things:

  1. Check that you are using modified drivers if needed for your wireless network card.

  2. Check that you are using modified firmware if needed for your wireless network card.

  3. Run the [device injection tests] to make sure injection is working properly.

  4. Check that he machine that executes the script doesn't generate background traffic that might interfere with the tests. In particular, remember to disable network in your OS, manually kill your DHCP client/server, etc.

  5. Confirm that you are connecting to the correct network. Double-check client.conf.

  6. Make sure the network is using (AES-)CCMP as the encryption algorithm.

Advanced Usage

Static IP Configuration

In case the device you are testing doesn't support DHCP, you can manually specify the IP addresses that the script should use. For example:

./fragattack.py wlan0 ping --inject wlan1 --ip 192.168.100.10 --peerip 192.168.100.1

Here the testing script will use address 192.168.100.10, and it will inject a ping request to the peer IP address 192.168.100.1.

TODOs

  • Confirm each device can detect all vulnerabilities in the recommended modes.

  • Test the attacks against PEAP-MSchap for eduroam tests (basic test was working).

  • TODO: Is it important to disable encryption? I don't think it is. Otherwise we need sysfsutils as a dependency too.

  • Include references to sections in the paper for the command overview table.

  • Create an example pcap and debug output of all tests.

  • Release a known vulnerable linux image to test against? Essential to confirm the tests are working!