Browse Source

krackattacks: improved --help output

Mathy 7 years ago
parent
commit
f7b47f409c
1 changed files with 10 additions and 8 deletions
  1. 10 8
      krackattack/krack-test-client.py

+ 10 - 8
krackattack/krack-test-client.py

@@ -32,8 +32,10 @@ the 4-way handshake or group key handshake, take the following steps:
 
 
 3. Execute this script. Accepted parameters are:
 3. Execute this script. Accepted parameters are:
 
 
-      --group   Test the group key handshake instead of the 4-way handshake
-      --debug   Show more debug messages
+      --group      Test the group key handshake instead of the 4-way handshake
+      --debug      Show more debug messages
+      --tptk       See step 5 (forge Msg1/4 with replayed ANonce before Msg3/4)
+      --tptk-rand  See step 5 (forge Msg1/4 with random ANonce before Msg3/4)
 
 
    All other supplied arguments are passed on to hostapd.
    All other supplied arguments are passed on to hostapd.
    The only two commands you will normally have to execute are:
    The only two commands you will normally have to execute are:
@@ -48,8 +50,8 @@ the 4-way handshake or group key handshake, take the following steps:
    !! The default network name is testnetwork with password abcdefgh !!
    !! The default network name is testnetwork with password abcdefgh !!
 
 
    Note that you can change settings of the AP by modifying hostapd.conf.
    Note that you can change settings of the AP by modifying hostapd.conf.
-   You will probably have to edit the line `interface=` to specify a Wi-Fi
-   interface to use for the AP.
+   You will probably have to edit the line `interface=` to specify the
+   correct Wi-Fi interface to use for the AP.
 
 
 4. To test key reinstallations in the 4-way handshake, the script will keep
 4. To test key reinstallations in the 4-way handshake, the script will keep
    sending encrypted message 3's to the client. To start the script execute:
    sending encrypted message 3's to the client. To start the script execute:
@@ -88,8 +90,8 @@ the 4-way handshake or group key handshake, take the following steps:
    injected before sending a retransmitted message 3. To test for this variant
    injected before sending a retransmitted message 3. To test for this variant
    of the attack, you can execute:
    of the attack, you can execute:
 
 
-      {name} --tptk			# Inject message 1 with a replayed ANonce
-      {name} --tptk-rand	# Inject message 1 with a random ANonce
+      {name} --tptk         # Inject message 1 with a replayed ANonce
+      {name} --tptk-rand    # Inject message 1 with a random ANonce
 
 
    Now follow the same steps as in step 4 to see if a supplicant is vulnerable.
    Now follow the same steps as in step 4 to see if a supplicant is vulnerable.
    Try both these attack variants after running the normal tests of step 4.
    Try both these attack variants after running the normal tests of step 4.
@@ -113,8 +115,8 @@ the 4-way handshake or group key handshake, take the following steps:
          by monitoring the IVs of frames sent by the client.
          by monitoring the IVs of frames sent by the client.
        - Capture traffic on the client to see if the replayed broadcast ARP
        - Capture traffic on the client to see if the replayed broadcast ARP
          requests are accepted or not.
          requests are accepted or not.
-   6c. If the client can use multiple Wi-Fi radios/NICs, test using a few
-       different ones.
+   6c. If the client being tested can use multiple Wi-Fi radios/NICs, test
+       using a few different ones.
 """
 """
 
 
 # FIXME:
 # FIXME: