|
@@ -14,6 +14,8 @@ from libwifi import *
|
|
import sys, socket, struct, time, subprocess, atexit, select, os.path
|
|
import sys, socket, struct, time, subprocess, atexit, select, os.path
|
|
from wpaspy import Ctrl
|
|
from wpaspy import Ctrl
|
|
|
|
|
|
|
|
+warned_hardware_decryption = False
|
|
|
|
+
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@@ -319,15 +321,46 @@ class KRAckAttackClient():
|
|
decap = header/plaintext[SNAP].payload
|
|
decap = header/plaintext[SNAP].payload
|
|
self.process_eth_rx(decap)
|
|
self.process_eth_rx(decap)
|
|
|
|
|
|
|
|
+ def check_hardware_encryption(self, p):
|
|
|
|
+ global warned_hardware_decryption
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ payload = get_ccmp_payload(p)
|
|
|
|
+ if dot11_is_encrypted_data(p) and payload != None and b"\xAA\xAA\x03\x00\x00\x00" in raw(p):
|
|
|
|
+ if payload.startswith(b"\xAA\xAA\x03\x00\x00\x00"):
|
|
|
|
+ if not warned_hardware_decryption:
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ log(WARNING, f"Hardware decryption detected! Attemping to still detect IV reuse, but this is unreliable.")
|
|
|
|
+ log(ERROR, f"!!! Ideally you disable hardware decryption or use a different network card !!!")
|
|
|
|
+ log(WARNING, f"E.g., detecting all-zero key use may currently be unreliable, and with some network")
|
|
|
|
+ log(WARNING, f" cards key reinstallations cannot be detected at all currently...")
|
|
|
|
+ warned_hardware_decryption = True
|
|
|
|
+ else:
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ log(ERROR, "Hardware decryption seems to be dropping the IV, meaning we cannot detect key reinstallations.")
|
|
|
|
+ log(ERROR, "Try to disable hardware decryption, use a different network card, or report this as a bug.")
|
|
|
|
+ log(WARNING, f"Frame causing the issue: {repr(p)} with raw data being {p}")
|
|
|
|
+ quit(1)
|
|
|
|
+
|
|
def handle_mon_rx(self):
|
|
def handle_mon_rx(self):
|
|
p = self.sock_mon.recv()
|
|
p = self.sock_mon.recv()
|
|
if p == None: return
|
|
if p == None: return
|
|
if p.type == 1: return
|
|
if p.type == 1: return
|
|
|
|
|
|
-
|
|
|
|
-
|
|
|
|
-
|
|
|
|
-
|
|
|
|
|
|
|
|
clientmac, apmac = (p.addr1, p.addr2) if (p.FCfield & 2) != 0 else (p.addr2, p.addr1)
|
|
clientmac, apmac = (p.addr1, p.addr2) if (p.FCfield & 2) != 0 else (p.addr2, p.addr1)
|
|
if apmac != self.apmac: return None
|
|
if apmac != self.apmac: return None
|
|
@@ -338,6 +371,8 @@ class KRAckAttackClient():
|
|
|
|
|
|
|
|
|
|
elif p.addr1 == self.apmac and dot11_is_encrypted_data(p):
|
|
elif p.addr1 == self.apmac and dot11_is_encrypted_data(p):
|
|
|
|
+ self.check_hardware_encryption(p)
|
|
|
|
+
|
|
if not clientmac in self.clients:
|
|
if not clientmac in self.clients:
|
|
self.clients[clientmac] = ClientState(clientmac, options=options)
|
|
self.clients[clientmac] = ClientState(clientmac, options=options)
|
|
client = self.clients[clientmac]
|
|
client = self.clients[clientmac]
|