|
@@ -23,7 +23,6 @@ IEEE80211_RADIOTAP_DATA_RETRIES = (1 << 17)
|
|
|
|
|
|
|
|
|
|
|
|
-
|
|
|
|
|
|
|
|
|
USAGE = """{name} - Tool to test Key Reinstallation Attacks against an AP
|
|
@@ -192,6 +191,7 @@ class KRAckAttackFt():
|
|
|
log(INFO, "Detected normal association frame")
|
|
|
self.reset_client()
|
|
|
|
|
|
+
|
|
|
elif p.addr1 == self.clientmac and Dot11WEP in p:
|
|
|
iv = dot11_get_iv(p)
|
|
|
log(INFO, "AP transmitted data using IV=%d (seq=%d)" % (iv, dot11_get_seqnum(p)))
|
|
@@ -210,6 +210,9 @@ class KRAckAttackFt():
|
|
|
def configure_interfaces(self):
|
|
|
log(STATUS, "Note: disable Wi-Fi in your network manager so it doesn't interfere with this script")
|
|
|
|
|
|
+
|
|
|
+ subprocess.check_output(["rfkill", "unblock", "wifi"])
|
|
|
+
|
|
|
|
|
|
subprocess.call(["iw", self.nic_mon, "del"], stdout=subprocess.PIPE, stdin=subprocess.PIPE)
|
|
|
|