Test Your Access Point For KRACK (FT Handshakes)
Security researcher Vanhoefm, who discovered the severe flaw in WPA implementation dubbed – the KRACK ( Key Reinstallation Attack ) has now released a script that can check your router for KRACK. The script is now available in ‘vanhoefm’ repository. All you have to do is download, install some dependencies and run this script against an access point.
What is KRACK?
Details about KRACK is available at Vanhoefm website. It make use of a flaw in WPA implementation in protocol level to perform MITM, packet decryption, session take over etc. When a station wants to join a wireless network, station and access point performs a one time process called 4 way handshake. During a 4 way handshake, it generates a unique key that will be later used for encryption of the network traffic. This key will be installed in the station when it successfully receives the 3rd packet of the 4 way handshake.
If the station receives the 3rd message multiple times, it will keep on installing the key again and again which will reset the nonce. We can take advantage of this flaw to decrypt the packets and perform various activities in the network.
Installation
Step 1
First update your current version of OS by executing
sudo apt update
Step 2
This script requires various libraries that may not be installed. So lets install them one by one.
sudo apt install libnl-3-dev libnl-genl-3-dev pkg-config libssl-dev net-tools git sysfsutils python-scapy python-pycryptodome
Step 3
Open up the Network Manager and disable WiFi. Now execute the below command so that our script can use WiFi
sudo rfkill unblock wifi
Step 4
Download the folder that contains the scripts from below link
https://github.com/vanhoefm/krackattacks-test-ap-ft.git
https://github.com/vanhoefm/krackattacks-test-ap-ft.git
or clone the repository by executing the command
git clone https://github.com/vanhoefm/krackattacks-test-ap-ft.git
Now you have the script ready to run.