Browse Source

krackattacks: print vulnerabilities in orange

Mathy Vanhoef 7 years ago
parent
commit
740c3f3543
1 changed files with 10 additions and 10 deletions
  1. 10 10
      krackattack/krack-test-client.py

+ 10 - 10
krackattack/krack-test-client.py

@@ -119,8 +119,8 @@ class ClientState():
 			if self.vuln_4way != ClientState.VULNERABLE:
 				iv = dot11_get_iv(p)
 				seq = dot11_get_seqnum(p)
-				log(INFO, ("%s: IV reuse detected (IV=%d, seq=%d). " +
-					"Client reinstalls the pairwise key in the 4-way handshake (this is bad)") % (self.mac, iv, seq), color="green")
+				log(WARNING, ("%s: IV reuse detected (IV=%d, seq=%d). " +
+					"Client reinstalls the pairwise key in the 4-way handshake (this is bad)") % (self.mac, iv, seq))
 			self.vuln_4way = ClientState.VULNERABLE
 
 		# If it's a higher IV than all previous ones, try to check if the client seems patched
@@ -153,9 +153,9 @@ class ClientState():
 		if self.vuln_4way != ClientState.VULNERABLE:
 			iv = dot11_get_iv(p)
 			seq = dot11_get_seqnum(p)
-			log(INFO, ("%s: usage of all-zero key detected (IV=%d, seq=%d). " +
-				"Client (re)installs an all-zero key in the 4-way handshake (this is very bad).") % (self.mac, iv, seq), color="green")
-			log(WARNING, "%s: !!! Other tests are unreliable due to all-zero key usage, please fix this vulnerability first !!!" % self.mac)
+			log(WARNING, ("%s: usage of all-zero key detected (IV=%d, seq=%d). " +
+				"Client (re)installs an all-zero key in the 4-way handshake (this is very bad).") % (self.mac, iv, seq))
+			log(WARNING, "%s: !!! Other tests are unreliable due to all-zero key usage, please fix this vulnerability first !!!" % self.mac, color="red")
 		self.vuln_4way = ClientState.VULNERABLE
 
 
@@ -174,13 +174,13 @@ class ClientState():
 		if self.options.variant in [TestOptions.Fourway, TestOptions.Grouphs]:
 			hstype = "group key" if self.options.variant == TestOptions.Grouphs else "4-way"
 			if self.options.gtkinit:
-				log(INFO, "%s: Client always installs the group key in the %s handshake with a zero replay counter (this is bad)." % (self.mac, hstype), color="green")
+				log(WARNING, "%s: Client always installs the group key in the %s handshake with a zero replay counter (this is bad)." % (self.mac, hstype))
 			else:
-				log(INFO, "%s: Client reinstalls the group key in the %s handshake (this is bad)." % (self.mac, hstype), color="green")
-			log(INFO, "                   Or client accepts replayed broadcast frames (see --replay-broadcast).", color="green")
+				log(WARNING, "%s: Client reinstalls the group key in the %s handshake (this is bad)." % (self.mac, hstype))
+			log(WARNING, "                   Or client accepts replayed broadcast frames (see --replay-broadcast).")
 		if self.options.variant == TestOptions.ReplayBroadcast:
-			log(INFO, "%s: Client accepts replayed broadcast frames (this is bad)." % self.mac, color="green")
-			log(INFO, "                   Fix this before testing for group key (re)installations!", color="green")
+			log(WARNING, "%s: Client accepts replayed broadcast frames (this is bad)." % self.mac)
+			log(WARNING, "                   Fix this before testing for group key (re)installations!")
 
 	def broadcast_process_reply(self, p):
 		"""Handle replies to the replayed ARP broadcast request (which reuses an IV)"""