Skip to content
This repository has been archived by the owner on May 4, 2022. It is now read-only.

Not getting an AP Probe Response #1

Closed
vapor99 opened this issue Nov 5, 2017 · 31 comments
Closed

Not getting an AP Probe Response #1

vapor99 opened this issue Nov 5, 2017 · 31 comments
Assignees

Comments

@vapor99
Copy link

vapor99 commented Nov 5, 2017

I know it's early (WIP), but I thought I'd mention that the program will only get an AP Probe Response if someone is joining the network. If the target is already associated to the AP, it needs to get deauthed before listening for a Probe Response.

@vdministrator
Copy link

I have the same problem!

@Hackndo
Copy link
Owner

Hackndo commented Nov 6, 2017

You're right, that's why I have step 5 in main(), with deauth jamming on the real AP channel.
While jamming with deauth on real AP channel, my fake AP is beaconing continuously on fake channel so that the client sees it and probe requests it. But that is not working. Client keeps probe requesting the real AP on jammed channel. That's the part I can't figure out.

Maybe I shouldn't wait for a probe request, and directly send probe responses on fake channel ? I'll give it a try.

@Hackndo
Copy link
Owner

Hackndo commented Nov 6, 2017

Answer is here : https://hackerone.com/reports/286740

The adversary uses Channel Switch Announcements to force victims into connecting to the cloned AP on channel 1.

I need to us CSA

@vapor99
Copy link
Author

vapor99 commented Nov 6, 2017

Have to find the CSA struct. Maybe in hostapd repo ieee.h somewhere.

@ldbfpiaoran
Copy link

ldbfpiaoran commented Nov 6, 2017

i see it need wlan1 and wlan0
I would like to ask waln0 is the external network card, then what is waln1?
think you very much!

@Hackndo
Copy link
Owner

Hackndo commented Nov 6, 2017

You need two wifi cards that can be used in monitor mode. If you only have one, you need to purchase another one (awus036h for example). But this PoC is WIP, so not working for now.

@ldbfpiaoran
Copy link

ldbfpiaoran commented Nov 6, 2017

I use a laptop, if I use a laptop with its own wireless network card and an external card, can you?
And my wireless network card is 8187
thank you very much

@Hackndo
Copy link
Owner

Hackndo commented Nov 6, 2017

Just check the paper for details. As I said, you need two wifi cards that can monitor traffic. Internal/external is irrelevant.

@Hackndo Hackndo self-assigned this Nov 6, 2017
@Hackndo
Copy link
Owner

Hackndo commented Nov 7, 2017

Commit #f962b19

@ldbfpiaoran
Copy link

ldbfpiaoran commented Nov 7, 2017

I saw you updated csa, then want to ask you, this poc can be achieved, use it to attack it,Or is it just a vulnerability verification

@Hackndo
Copy link
Owner

Hackndo commented Nov 7, 2017

Its goal is to be a full PoC, not just a vulnerability verification (scapy has a module for that)

@ldbfpiaoran
Copy link

谢谢,那您的意思是现在这个poc是可以使用的,还是在完善之中?,我的英语很糟糕,请原谅

@Hackndo
Copy link
Owner

Hackndo commented Nov 7, 2017

It's not finished. It will be finished when I remove "WIP" tag from project name (see TODO list in the Readme)

@ldbfpiaoran
Copy link

Thank you very much, my leader wanted me to study this vulnerability, but I have absolutely no contact with this protocol, I prefer web security, but spent the day yesterday studying /~https://github.com/vanhoefm/krackattacks- Test-ap-ft in the tool, they found only poc, until encountered your project, I am pleased to meet you, if you can become friends

@Hackndo
Copy link
Owner

Hackndo commented Nov 8, 2017

Succeeded to have a Key Reinstallation from the client, but it seems very unstable. Need to work out how to make it more accurate.

@Blkzer0
Copy link

Blkzer0 commented Nov 9, 2017

Does the target ap have to have csa enabled in order to get an ap probe response?

@Hackndo
Copy link
Owner

Hackndo commented Nov 10, 2017

I'm not sure I got your question. Target AP doesn't need to have anything enabled. Client has to understand CSA requests though.

@Blkzer0
Copy link

Blkzer0 commented Nov 10, 2017

ok im just trying to understand this better, so for the ap probe response to work correctly, someone needs to join the targets ap thats why there is a jammer. Could it be the jammer that doesnt kick everyone off the ap long enough for you to catch the response probe?
For example, i had a few cases where i couldnt get a handshake thru regular means like sending deauth to target ap with aireplay so i had to use mdk3 instead to capture a handshake. Im not sure why but i suspected it to be because of the anti-ap packet spoof feature.

@Hackndo
Copy link
Owner

Hackndo commented Nov 13, 2017

Could it be the jammer that doesnt kick everyone off the ap long enough for you to catch the response probe?

I'm only kicking the targeted client, and it's working, it's just unstable, as I said before 😉
Unfortunately I don't have much time to spend on this project. I'll try to improve it later though

@ldbfpiaoran
Copy link

ldbfpiaoran commented Nov 13, 2017

hey, I see a exploit on github ,This may be of some help for you. The address is /~https://github.com/NoahhhRyan/krackattacks-test. and doc address is http://www.freebuf.com/articles/wireless/153255.html.Good lucky!

@Hackndo
Copy link
Owner

Hackndo commented Nov 13, 2017

Hello,

Thank you for sharing. I saw that and it has plenty of useful information, but it's neither implementing MitM not crypto attack.

Useful paper is channel-base MitM for those who wanna try to make this script work better.

@ldbfpiaoran
Copy link

Haha, this agreement is not very understand, I wish you an early completion of your exploit

@Tomotaa
Copy link

Tomotaa commented Dec 20, 2017

I enforce it, an error occurred that "Could not retreive an AP Probe response“.What should I do next?

@sergeyzapor
Copy link

Is it possible to use the code for WPA-TKIP?

@Hackndo
Copy link
Owner

Hackndo commented Feb 8, 2018

@Tomotaa : It might be necessary to force AP Probe Response with a manual deauth
@sergeyzapor : It is not the same thing, and TKIP is already vulnerable to some easier and well known vulnerabilities/attacks. An example here

@ldbfpiaoran
Copy link

@sergeyzapor The poc is Imperfect.So It's hard to attack successfully.Also the
author did not update it.

@Lexus89
Copy link

Lexus89 commented Mar 27, 2018

Are there any plans to update this PoC to increase stability? Would be really great!

@koerle
Copy link

koerle commented Apr 2, 2018

Are there any plans to update this? Last updating is long times ago~ I hope it can be finished,pls~

@Hackndo
Copy link
Owner

Hackndo commented Apr 2, 2018

Hi, no i don't have time to update it. But please feel free to do so !

@Rainzer
Copy link

Rainzer commented Apr 23, 2018

I would like to ask if it is necessary to save AP Probe response.

@Hackndo
Copy link
Owner

Hackndo commented Jan 9, 2019

Not maintained anymore.

@Hackndo Hackndo closed this as completed Jan 9, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

10 participants