Browse Source

Move FT script instructions to README.md

vanhoefm 7 years ago
parent
commit
205fdf0f97
1 changed files with 68 additions and 6 deletions
  1. 68 6
      README.md

+ 68 - 6
README.md

@@ -99,16 +99,78 @@ Their tools supports several different tests, and these tests correspond to the
 - 4.2.1 (Group key handshake vulnerability test on STA). Execue this test using `./krack-test-client.py --group`.
 - 4.3.1 (Reinstallation of GTK and IGTK on STA supporting WNM sleep mode). We currently do not support this test (and neither does the Wi-Fi Alliance).
 
+
 # Testing Access Points: Detecting a vulnerable FT Handshake (802.11r)
 
-The attached Linux script `krack-ft-test.py` can be used to determine if an AP is vulnerable to our attack. The script contains detailed documentation on how to use it:
+1. Create a wpa_supplicant configuration file that can be used to connect to the network. A basic example is:
+
+		ctrl_interface=/var/run/wpa_supplicant
+		network={{
+		  ssid="testnet"
+		  key_mgmt=FT-PSK
+		  psk="password"
+		}}
+
+	Note the use of "FT-PSK". Save it as network.conf or similar. For more info see [wpa_supplicant.conf](https://w1.fi/cgit/hostap/plain/wpa_supplicant/wpa_supplicant.conf).
+
+2. Try to connect to the network using your platform's wpa_supplicant. This will likely require a command such as:
+
+		sudo wpa_supplicant -D nl80211 -i wlan0 -c network.conf
+
+	If this fails, either the AP does not support FT, or you provided the wrong network configuration options in step 1.
+
+3. Use this script as a wrapper over the previous wpa_supplicant command:
+
+		sudo ./krack-ft-test.py wpa_supplicant -D nl80211 -i wlan0 -c network.conf
+
+	This will execute the wpa_supplicant command using the provided parameters, and will add a virtual monitor interface that will perform attack tests.
 
-	cd krackattack/
-	./krack-ft-test.py --help
+4. Use wpa_cli to roam to a different AP of the same network. For example:
 
-**Now follow the detail instructions that the script outputs.**
-Essentially, it wraps a normal `wpa_supplicant` client, and will keep replaying the FT Reassociation Request (making the AP reinstall the PTK).
+		sudo wpa_cli -i wlan0
+		> status
+		bssid=c4:e9:84:db:fb:7b
+		ssid=testnet
+		...
+		> scan_results 
+		bssid / frequency / signal level / flags / ssid
+		c4:e9:84:db:fb:7b	2412  -21  [WPA2-PSK+FT/PSK-CCMP][ESS] testnet
+		c4:e9:84:1d:a5:bc	2412  -31  [WPA2-PSK+FT/PSK-CCMP][ESS] testnet
+		...
+		> roam c4:e9:84:1d:a5:bc
+		...
+   
+	In this example we were connected to AP c4:e9:84:db:fb:7b of testnet (see status command). The scan_results command shows this network also has a second AP with MAC c4:e9:84:1d:a5:bc. We then roam to this second AP.
 
+5. Generate traffic between the AP and client. For example:
+
+		sudo arping -I wlan0 192.168.1.10
+
+6. Now look at the output of ./krack-ft-test.py to see if the AP is vulnerable.
+
+	1. First it should say "Detected FT reassociation frame". Then it will start replaying this frame to try the attack.
+	2. The script shows which IVs (= packet numbers) the AP is using when sending data frames.
+	3. Message `IV reuse detected (IV=X, seq=Y). AP is vulnerable!` means we confirmed it's vulnerable.
+
+	Be sure to manually check network traces as well, to confirm this script is replaying the reassociation request properly, and to manually confirm whether there is IV (= packet number) reuse or not.
+
+	Example output of vulnerable AP:
+	
+		[15:59:24] Replaying Reassociation Request
+		[15:59:25] AP transmitted data using IV=1 (seq=0)
+		[15:59:25] Replaying Reassociation Request
+		[15:59:26] AP transmitted data using IV=1 (seq=0)
+		[15:59:26] IV reuse detected (IV=1, seq=0). AP is vulnerable!
+
+	Example output of patched AP (note that IVs are never reused):
+	
+		[16:00:49] Replaying Reassociation Request
+		[16:00:49] AP transmitted data using IV=1 (seq=0)
+		[16:00:50] AP transmitted data using IV=2 (seq=1)
+		[16:00:50] Replaying Reassociation Request
+		[16:00:51] AP transmitted data using IV=3 (seq=2)
+		[16:00:51] Replaying Reassociation Request
+		[16:00:52] AP transmitted data using IV=4 (seq=3)
 
 # Extra: Ubuntu 16.04
 
@@ -121,7 +183,7 @@ They further recommended to install this python module under a virtual python en
 
 # Extra: Manual Tests
 
-It's also possible to manually perform tests by cloning the hostap git repository:
+It's also possible to manually perform (more detailed) tests by cloning the hostap git repository:
 
 	git clone git://w1.fi/srv/git/hostap.git