Browse Source

krackattack: improved usage description

Mathy 7 years ago
parent
commit
fd6d7fe057
1 changed files with 8 additions and 11 deletions
  1. 8 11
      krackattack/krack-test-client.py

+ 8 - 11
krackattack/krack-test-client.py

@@ -35,13 +35,13 @@ the 4-way handshake or group key handshake, take the following steps:
       --debug   Show more debug messages
       --debug   Show more debug messages
 
 
    All other supplied arguments are passed on to hostapd.
    All other supplied arguments are passed on to hostapd.
-   The only two examples you will normally need are:
+   The only two commands you will normally have to execute are:
 
 
       {name}
       {name}
       {name} --group
       {name} --group
 
 
    The first one tests for key reinstallations in the 4-way handshake (see
    The first one tests for key reinstallations in the 4-way handshake (see
-   step 4), and the second one for key reinstallations in the group key
+   step 4), and the second tests one for key reinstallations in the group key
    handshake (see step 5).
    handshake (see step 5).
 
 
    !! The default network name is testnetwork with password abcdefgh !!
    !! The default network name is testnetwork with password abcdefgh !!
@@ -55,12 +55,11 @@ the 4-way handshake or group key handshake, take the following steps:
 
 
       {name}
       {name}
 
 
-   Connect the the AP and all tests will be performed automatically.
+   Connect the the AP and the following tests will be performed automatically:
 
 
-   4a. Our tool retransmits encrypted message 3's of the 4-way handshake. The
-     script monitors traffic sent by the client to see if the pairwise key is
-     being reinstalled. To assure the client is sending enough frames, you can
-     optionally ping the AP: ping 192.168.100.254 .
+   4a. The script monitors traffic sent by the client to see if the pairwise
+     key is being reinstalled. To assure the client is sending enough frames,
+     you can optionally ping the AP: ping 192.168.100.254 .
 
 
      If the client is vulnerable, the script will show something like:
      If the client is vulnerable, the script will show something like:
         [19:02:37] 78:31:c1:c4:88:92: IV reuse detected (IV=1, seq=10). Client is vulnerable to pairwise key reinstallations in the 4-way handshake!
         [19:02:37] 78:31:c1:c4:88:92: IV reuse detected (IV=1, seq=10). Client is vulnerable to pairwise key reinstallations in the 4-way handshake!
@@ -83,7 +82,6 @@ the 4-way handshake or group key handshake, take the following steps:
      Note that this scripts *indirectly* tests for reinstallations of the group
      Note that this scripts *indirectly* tests for reinstallations of the group
      key, by testing if replayed broadcast frames are accepted by the client.
      key, by testing if replayed broadcast frames are accepted by the client.
 
 
-
 5. To test key reinstallations in the group key handshake, the script will keep
 5. To test key reinstallations in the group key handshake, the script will keep
    performing new group key handshakes using an identical (static) group key.
    performing new group key handshakes using an identical (static) group key.
    The client *must* request an IP using DHCP for this test to start. To start
    The client *must* request an IP using DHCP for this test to start. To start
@@ -92,12 +90,11 @@ the 4-way handshake or group key handshake, take the following steps:
       {name} --group
       {name} --group
 
 
    Connect the the AP and all tests will be performed automatically. The
    Connect the the AP and all tests will be performed automatically. The
-   working and output of the script is similar as in step 4b.
-
+   working and output of the script is now similar as in step 4b.
 
 
 6. Some final recommendations:
 6. Some final recommendations:
 
 
-   6a. Perform these tests in a room with little interference. A *high* amount
+   6a. Perform these tests in a room with little interference. A high amount
        of packet loss will make this script unreliable!
        of packet loss will make this script unreliable!
    6b. Manually inspect network traffic to confirm the output of the script:
    6b. Manually inspect network traffic to confirm the output of the script:
        - Use an extra Wi-Fi NIC in monitor mode to check pairwise key reinstalls
        - Use an extra Wi-Fi NIC in monitor mode to check pairwise key reinstalls