Home | History | Annotate | Download | only in krack
      1 """Module implementing Krack Attack on client, as a custom WPA Access Point
      2 
      3 More details on the attack can be found on https://www.krackattacks.com/
      4 
      5 Example of use (from the scapy shell):
      6 >>> load_module("krack")
      7 >>> KrackAP(
      8     iface="mon0",               # A monitor interface
      9     ap_mac='11:22:33:44:55:66', # MAC (BSSID) to use
     10     ssid="TEST_KRACK",          # SSID
     11     passphrase="testtest",      # Associated passphrase
     12 ).run()
     13 
     14 Then, on the target device, connect to "TEST_KRACK" using "testtest" as the
     15 passphrase.
     16 The output logs will indicate if one of the vulnerability have been triggered.
     17 
     18 Outputs for vulnerable devices:
     19 - IV re-use!! Client seems to be vulnerable to handshake 3/4 replay
     20   (CVE-2017-13077)
     21 - Broadcast packet accepted twice!! (CVE-2017-13080)
     22 - Client has installed an all zero encryption key (TK)!!
     23 
     24 For patched devices:
     25 - Client is likely not vulnerable to CVE-2017-13080
     26 """
     27 
     28 from scapy.modules.krack.automaton import KrackAP
     29