1 """Module implementing Krack Attack on client, as a custom WPA Access Point 2 3 More details on the attack can be found on https://www.krackattacks.com/ 4 5 Example of use (from the scapy shell): 6 >>> load_module("krack") 7 >>> KrackAP( 8 iface="mon0", # A monitor interface 9 ap_mac='11:22:33:44:55:66', # MAC (BSSID) to use 10 ssid="TEST_KRACK", # SSID 11 passphrase="testtest", # Associated passphrase 12 ).run() 13 14 Then, on the target device, connect to "TEST_KRACK" using "testtest" as the 15 passphrase. 16 The output logs will indicate if one of the vulnerability have been triggered. 17 18 Outputs for vulnerable devices: 19 - IV re-use!! Client seems to be vulnerable to handshake 3/4 replay 20 (CVE-2017-13077) 21 - Broadcast packet accepted twice!! (CVE-2017-13080) 22 - Client has installed an all zero encryption key (TK)!! 23 24 For patched devices: 25 - Client is likely not vulnerable to CVE-2017-13080 26 """ 27 28 from scapy.modules.krack.automaton import KrackAP 29