fragattacks/research
2020-04-25 10:12:44 -04:00
..
ath9k-firmware fragattack: ath9k_htc firmware to preserve sequence numbers 2020-03-01 04:56:26 -05:00
libwifi@004cd93c83 fragattack: updated eapol_msdu test and clean up test selection 2020-04-23 11:50:21 -04:00
build.sh fragattack: update to README and small script fix 2020-04-16 00:56:34 -04:00
client.conf fragattack: prepare configs for WEP tests 2020-04-22 19:13:32 -04:00
deinit.sh fragattack: tests and results on forcing frame fragmentation 2020-02-29 15:56:41 -05:00
fragattack.py fragattack: add --bcast option 2020-04-25 10:12:44 -04:00
hostapd.conf fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
hwcrypto.sh fragattack: script to turn hardware encryption on or off 2020-03-07 21:10:55 -05:00
init.sh fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
post-analysis.py fragattack: netbsd force fragment experiments 2020-03-01 19:03:08 -05:00
README.md fragattacks: README update 2020-04-20 19:26:15 -04:00
start_ap.sh fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
start_sta2.sh fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
start_sta.sh fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
tests_qca.py fragattacks: various improvements to ping test for experiments 2020-04-23 10:19:14 -04:00
wpaspy.py fragattack: script to inject encrypted fragmented frames 2020-02-27 07:07:19 -05:00

Usage

Installation

  1. Compile and install backports

  2. Install the dependencies in ../../requirements.txt (Python3).

  3. Compile the modified hostapd and wpa_supplicant using cd research && ./build.sh. If this fails install the required dependencies. The build.sh script is also very trivial so you can manually execute each command in that script to see where it fails and how to fix it.

  4. Before proceding, make sure to have pulled all submodules (i.e., libwifi).

Example Usage

Then you can run ./fragattack.py interface tests where the first argument is the interface to use. This inferface should NOT be set to monitor mode (the script will handle this). The second parameter is the test to execute.

You can first execute a simple ping to see if everything is working:

./fragattack.py wlan0 ping --ip 192.168.100.10 --peerip 192.168.100.1

Here peerip is the IP address of the AP/router we are testing, and ip denotes the IP address we are assignment to the client. Edit the file client.conf the specify the SSID and password of the network you are testing. You should see a message "SUCCESSFULL INJECTION".