<?xml version="1.0"?>
<rss version="2.0"><channel><title>Wireless Pentesting Latest Topics</title><link>https://rstforums.com/forum/forum/30-wireless-pentesting/</link><description>Wireless Pentesting Latest Topics</description><language>en</language><item><title>SIMPLY, THE BEST WiFi ANTENNA</title><link>https://rstforums.com/forum/topic/47967-simply-the-best-wifi-antenna/</link><description><![CDATA[<p>From this WiFi antenna construction, </p><p><a href="http://postimage.org/" rel="external nofollow"><img src="http://s16.postimage.org/6yd107phh/IMG_5718.jpg" alt="IMG_5718.jpg"></a></p><p>...you can build with PCB (Printed Circuit Board) a simple and effective component reception...</p><p><a href="http://postimage.org/" rel="external nofollow"><img src="http://s16.postimage.org/w5nx0gslh/PCB.jpg" alt="PCB.jpg"></a></p><p><a href="http://postimage.org/" rel="external nofollow"><img src="http://s16.postimage.org/etnkf0z45/Untitled_0_011.jpg" alt="Untitled_0_011.jpg"></a></p><p>And now look how it behaves mini-antenna,in the focus of a parabola, with D = 600mm...</p><p><a href="http://postimage.org/" rel="external nofollow"><img src="http://s16.postimage.org/os8j1i8jp/Untitled_0_012.jpg" alt="Untitled_0_012.jpg"></a></p>
]]></description><guid isPermaLink="false">47967</guid><pubDate>Thu, 05 Apr 2012 08:28:16 +0000</pubDate></item><item><title>WPA dic&#x21B;ionar in romana</title><link>https://rstforums.com/forum/topic/119507-wpa-dic%C8%9Bionar-in-romana/</link><description><![CDATA[<p>
	Salutare.
</p>

<p>
	 
</p>

<p>
	Are careva dicționar sau dicționare pentru WPA ? Dicționarele sa conțină cuvinte românești/posibile parole in romana. 
</p>

<p>
	 
</p>

<p>
	Sau ceva default WPA passwords pentru deviceurile Fiberhome ? 
</p>

<p>
	 
</p>

<p>
	 
</p>

<p>
	Mulțumesc!
</p>
]]></description><guid isPermaLink="false">119507</guid><pubDate>Thu, 30 May 2024 04:59:18 +0000</pubDate></item><item><title>Adaptor wi fi</title><link>https://rstforums.com/forum/topic/119396-adaptor-wi-fi/</link><description><![CDATA[<p>
	Salutare la toata lumea !
</p>

<p>
	Nu reusesc sa ma conectez la wi fi in kali 2024.1  ... adaptorul este un TL-WN722N ,am facut cam tot ce se gaseste in tutorialele de pe yt,instalat drivere bifat tot felul de chestii dar nu reusesc sa ma conectez
</p>

<p>
	Cand tastez ifconfig arata ca am wlan0 ,sau lsusb arata adaptorul dar nu se conecteaza
</p>

<p>
	Nu imi apare nici un fel de retea la available networks
</p>

<p>
	Folosesc windows 11 si kali este instalat in VM ... atunci cand este conectat adaptorul la computer are un led care licareste dar cum deschid VM si kali acel led se stinge si nu mai face nimic,chiar daca in kali imi apare si este bifat ca sa il foloseasca ...
</p>

<p>
	Ma poate ajuta cineva ?
</p>
]]></description><guid isPermaLink="false">119396</guid><pubDate>Sun, 05 May 2024 08:00:10 +0000</pubDate></item><item><title>Conectare kali linux la gns3</title><link>https://rstforums.com/forum/topic/117337-conectare-kali-linux-la-gns3/</link><description><![CDATA[<p>
	Salut, stie cineva cum pot sa conectez kali linux instalat pe virtual box si o topologie gns3? Am tot cautat pe net un tutorial ok, dar nu am gasit nimic care sa ma ajute. Multumesc!
</p>
]]></description><guid isPermaLink="false">117337</guid><pubDate>Thu, 01 Jun 2023 23:24:52 +0000</pubDate></item><item><title>Dumpper arata text-cod in aplicatie</title><link>https://rstforums.com/forum/topic/118931-dumpper-arata-text-cod-in-aplicatie/</link><description><![CDATA[<p>
	Am incercat sa schimb meniul default din spaniola in engleza si acum imi apare doar asa.
</p>

<p>
	am incercat sa schimb la loc, sa descarc iar aplicatia, nimic
</p>

<p>
	 
</p>

<p>
	vreo idee?
</p>

<p>
	 
</p>

<p>
	 
</p>

<p>
	<img alt="V35Ixq4.jpg" class="ipsImage" data-ratio="51.40" height="385" width="1000" src="https://i.imgur.com/V35Ixq4.jpg" />
</p>
]]></description><guid isPermaLink="false">118931</guid><pubDate>Sat, 14 Oct 2023 09:08:13 +0000</pubDate></item><item><title>Handshake crack</title><link>https://rstforums.com/forum/topic/116024-handshake-crack/</link><description><![CDATA[<p>
	As vrea sa stiu o metoda de decriptare a handshake ului...fara brute force, evil twin.
</p>
]]></description><guid isPermaLink="false">116024</guid><pubDate>Thu, 24 Nov 2022 15:49:41 +0000</pubDate></item><item><title>Ajutor dictionar customizat</title><link>https://rstforums.com/forum/topic/114636-ajutor-dictionar-customizat/</link><description><![CDATA[<p>
	Salut tuturor,
</p>

<p>
	 
</p>

<p>
	As dori sa creez un dictionar customizat pentru Digi wpa2 si nu prea stiu cum ar trebui sa fac. Am incercat sa folosesc crunch, insa imi dubleaza multe caractere si flerul cumva imi spune ca respectiva parola este de 8 caractere si parola este cea default de la Digi. 2 litere mari, 3 cifre, 2 litere mici si o cifra, aceste nu se repeta intre ele.
</p>

<p>
	Am vazut ca exista pe site link-uri generatoare de parole pentru UPC, pentru Digi exista asa ceva?
</p>

<p>
	WPS-ul este dezactivat, nu pot folosi reaver sau alte programe pentru el.
</p>

<p>
	 
</p>

<p>
	Va multumesc anticipat!
</p>
]]></description><guid isPermaLink="false">114636</guid><pubDate>Thu, 22 Apr 2021 22:11:15 +0000</pubDate></item><item><title>Decodare Router Orange</title><link>https://rstforums.com/forum/topic/104064-decodare-router-orange/</link><description><![CDATA[<p>
	<img alt="poza.jpg" class="ipsImage" src="https://s24.postimg.org/8387d8dzp/poza.jpg"></p>

<p>
	Stiu ca am mai facut un topic , tot pe tema asta , dar nu am primit un raspuns si na, poate acum reusesc .<br>
	Am un Router cu Slot Sim de la Orange (l-am primit de la un prieten) , iar la tara detin un modem de la Digi(la abonament d-ala de 25 de lei/luna) , faza e ca nu am semnal cam in orice loc , am semnal doar in anumite zone din casa si na , daca am asta ma gandesc ca il pot folosi (am decodat un modem de la Romtelecom si Vodafone , ma cam oftic ca la asta ma chinui si nu reusesc ).<br>
	In oras detin un router , dar acela nu are slot sim  ca il foloseam pe ala (ma caram mereu cu el , dar cel putin faceam ceva ) .
</p>

<p>
	Cam <a href="https://s29.postimg.org/d9barfmtj/image.png" rel="external nofollow">asa</a> arata interfata routerului ( Versiune hardware: WL1B662I Ver.A Versiune software: 1531.11.527.01.100).
</p>

<p>
	Nu ca mi ar fi greu sa cumpar un hot spot portabil , dar nu prea are rost sa mai bag bani in asa ceva deoarece cand ajung la tara  nu fac multe chestii in mediul online , mai mult ma relaxez , dar uneori am chef sa ma mai uit la un film sau la ceva pe youtube si pentru asa ceva trebuie sa ma plimb cu laptopul prin casa sa caut semnal , asa cu asta gasesc locul pefect si il las naiba acolo...<br>
	Astept idei si sper sa reusesc ..
</p>
]]></description><guid isPermaLink="false">104064</guid><pubDate>Thu, 29 Dec 2016 11:41:20 +0000</pubDate></item><item><title>I have this and i cannot crack it.</title><link>https://rstforums.com/forum/topic/115942-i-have-this-and-i-cannot-crack-it/</link><description><![CDATA[<p>
	Am acest hash si nu pot sa-l crack-uiesc. Hash-ul e de la o retea wifi.
</p>

<p>
	WPA*01*150f42d3073fe9d0e81f7cc45a1e825c*745aaa4727e0*3243a180cb21*444947492d6d396e59***<br />
	WPA*01*d5defd02612774886f44eac1967ce546*745aaa4727e0*3ee6dd58a332*444947492d6d396e59***<br />
	WPA*01*30c3d8c1389336aca0000606c44f683e*745aaa4727e0*6e786872cc46*444947492d6d396e59***<br />
	WPA*01*46817f0d832a59539901dce9aa9392e4*745aaa4727e0*a2634c49656c*444947492d6d396e59***<br />
	WPA*01*6ff485a6018fe57043c1e8b7ca5453cf*745aaa4727e0*a408018f658f*444947492d6d396e59***<br />
	WPA*01*5d9321a2b8d97b3ece28a72e9691f328*745aaa4727e0*f8da0c060241*444947492d6d396e59***<br />
	WPA*01*ff261065914ffab99160736867339939*745aaa4727e0*fce26c1a5549*444947492d6d396e59***<br />
	WPA*02*cc52caaf47904df17a33f64e564f7972*745aaa4727e0*3243a180cb21*444947492d6d396e59*fe5705ad60170435ee5c4134463297a0b51ffbb6227bcbcc20ca928a8171ea3f*0103007702010a00000000000000000004ad94eee29be9bc344ba275de9567c6aad3474fbbe976748001237fb810401c83000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001830160100000fac040100000fac040100000fac0200000000*a2<br />
	WPA*02*1436f8f26ad41ce3cdb208a8de250041*745aaa4727e0*a408018f658f*444947492d6d396e59*fe5705ad60170435ee5c4134463297a0b51ffbb6227bcbcc20ca928a8171ea82*0103007502010a0000000000000000003c286af6dfbdcf1e3ac68941abccc5bf66c24f3247309119173802b5ee8ac25ae5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac028000*a2
</p>
]]></description><guid isPermaLink="false">115942</guid><pubDate>Sat, 29 Oct 2022 20:26:57 +0000</pubDate></item><item><title>WiFi QR Code Generator</title><link>https://rstforums.com/forum/topic/115632-wifi-qr-code-generator/</link><description><![CDATA[<p>
	<strong>Joining a Wi‑Fi network</strong>
</p>

<p>
	 
</p>

<p>
	By specifying the SSID, encryption type, password/passphrase, and if the SSID is hidden or not, mobile device users can quickly scan and join networks without having to manually enter the data.<sup><a href="https://en.wikipedia.org/wiki/QR_code#cite_note-49" rel="external nofollow">[49]</a></sup> A MECARD-like format is supported by Android and iOS 11+.<sup><a href="https://en.wikipedia.org/wiki/QR_code#cite_note-50" rel="external nofollow">[50]</a></sup>
</p>

<p>
	 
</p>

<p style="text-align:center;">
	<img alt="wifi.jpg" class="ipsImage" data-ratio="53.40" height="465" width="1000" src="https://i.ibb.co/QKSKnwv/wifi.jpg" />
</p>

<p>
	 
</p>

<p>
	 
</p>

<p>
	<strong><a href="https://app.qr-code-generator.com/site/signup/?_gl=1*1am5jja*_ga*Mjg2NzQ1NTkyLjE2NTkyMzYwMDY.*_ga_8YZ6XFRQHW*MTY1OTIzNjAwNi4xLjEuMTY1OTIzNjMwNy4w&amp;_ga=2.95079576.586987048.1659236007-286745592.1659236006" rel="external nofollow">Try free now</a></strong>
</p>

<p>
	 
</p>

<p>
	<strong>Source: <a href="https://en.wikipedia.org/wiki/QR_code#Joining_a_Wi%E2%80%91Fi_network" rel="external nofollow">wikipedia</a></strong>
</p>
]]></description><guid isPermaLink="false">115632</guid><pubDate>Sun, 31 Jul 2022 03:03:42 +0000</pubDate></item><item><title>Network Adaptor monitor mode (Recomandare)</title><link>https://rstforums.com/forum/topic/106955-network-adaptor-monitor-mode-recomandare/</link><description><![CDATA[<p>
	Salutare tuturor, 
</p>

<p>
	 
</p>

<p>
	Am si eu nevoie de un adaptor wi-fi care sa suporte si functia de monitorizare pachete, momentan am un killer double shoot pro, un Edimax EW-7811UAC AC600 si un  TP-LINK TL-WN722N (v2 din pacate). Nici unul dintre aceste adaptoare nu functioneaza cu kali iar alfa n-am prea gasit aici sau ce am gasit erau sh si de la 180-200 ron in sus. Stiti cumva un adaptor bun care sa fie compatibil cu linux kali pana in 100 ron? Daca aveti sugestii lasti va rog un link (de la magazinele romanesti) cu produsul.
</p>
]]></description><guid isPermaLink="false">106955</guid><pubDate>Tue, 07 Nov 2017 08:29:07 +0000</pubDate></item><item><title>Hotspot pe VPN</title><link>https://rstforums.com/forum/topic/115265-hotspot-pe-vpn/</link><description><![CDATA[<p>
	Salutare, dețin 5 hotspot-uri sensecap ( pentru minat Helium ) și doresc sa le conectez pe toate in aceasi locație, dar cumva sa apăra in locații diferite, din ce am văzut pe google, se poate face printr-un VPN ca fiecare sa aibă port diferit si cumva sa vadă portul 44158, ( nu prea m-am exprimat cum trebuie, pentru ca nu ma pricep) știe cineva cum se face ? <br />
	 
</p>

<p>
	Am găsit pe cineva care a reușit, am Atașat pozele mai jos ! <br />
	<img alt="tPL5um9p_0B7AA2EC-AAAC-4B6C-9EDC-CB85B97" class="ipsImage" data-ratio="75.08" height="538" width="1000" src="https://cdn.imageupload.workers.dev/tPL5um9p_0B7AA2EC-AAAC-4B6C-9EDC-CB85B977A0D7.jpeg" />
</p>

<p>
	 
</p>

<p>
	<img alt="2AvBdPKd_346DB76F-A95B-403A-B11C-0EBB7AE" class="ipsImage" data-ratio="75.08" height="750" width="884" src="https://cdn.imageupload.workers.dev/2AvBdPKd_346DB76F-A95B-403A-B11C-0EBB7AE712C3.jpeg" />
</p>

<p>
	 
</p>
]]></description><guid isPermaLink="false">115265</guid><pubDate>Sun, 02 Jan 2022 11:46:56 +0000</pubDate></item><item><title>Antena wifi</title><link>https://rstforums.com/forum/topic/109510-antena-wifi/</link><description><![CDATA[<p>
	Salut,am si eu o intrebare sunt in Marea Britanie si am nevoie sa cumpar o antena cu care sa captez semnal wifi de la hot-spoturile din zona imi poate recomanda cineva ceva,va multumesc frumos.
</p>

<p>
	De exemplu pe laptop prind cam o liniuta maxim doua liniute de semnal de la un hot spot din zona si as vrea o antena ceva sa aplifice acel semnal sa prind 3 liniute minim.
</p>

<p>
	Daca ma poate ajuta cineva cu o antena sau un amplificator de semnal il rog frumos sa lase un reply.
</p>

<p>
	De preferat postati site-uri care livreaza in UK gen amazon,ebay etc.
</p>
]]></description><guid isPermaLink="false">109510</guid><pubDate>Sat, 03 Nov 2018 14:30:04 +0000</pubDate></item><item><title>FragAttacks</title><link>https://rstforums.com/forum/topic/114695-fragattacks/</link><description><![CDATA[<h2>
	<a href="https://www.fragattacks.com/#intro" rel="external nofollow">INTRODUCTION</a>
</h2>

<p>
	11 May 2021 — This website presents FragAttacks (fragmentation and aggregation attacks) which is a collection of new security vulnerabilities that affect Wi-Fi devices. An adversary that is within radio range of a victim can abuse these vulnerabilities to steal user information or attack devices. Three of the discovered vulnerabilities are design flaws in the Wi-Fi standard and therefore affect most devices. On top of this, several other vulnerabilities were discovered that are caused by widespread programming mistakes in Wi-Fi products. Experiments indicate that every Wi-Fi product is affected by at least one vulnerability and that most products are affected by several vulnerabilities.
</p>

<p>
	The discovered vulnerabilities affect all modern security protocols of Wi-Fi, including the latest WPA3 specification. Even the original security protocol of Wi-Fi, called WEP, is affected. This means that several of the newly discovered design flaws have been part of Wi-Fi since its release in 1997! Fortunately, the design flaws are hard to abuse because doing so requires user interaction or is only possible when using uncommon network settings. As a result, in practice the biggest concern are the programming mistakes in Wi-Fi products since several of them are trivial to exploit.
</p>

<p>
	The discovery of these vulnerabilities comes as a surprise, because the security of Wi-Fi has in fact significantly improved over the past years. For instance, previously we discovered the <a href="https://www.krackattacks.com/" rel="external nofollow">KRACK attacks</a>, the defenses against KRACK were <a href="https://www.usenix.org/conference/usenixsecurity20/presentation/cremers" rel="external nofollow">proven secure</a>, and the latest WPA3 security specification has <a href="https://www.wi-fi.org/file/wi-fi-security-roadmap-and-wpa3-updates-december-2020" rel="external nofollow">improved</a>. Unfortunately, a feature that could have prevented one of the newly discovered design flaws was not adopted in practice, and the other two design flaws are present in a feature of Wi-Fi that was previously not widely studied. This shows it stays important to analyze even the most well-known security protocols (if you want to help, we are <a href="https://www.fragattacks.com/#hiring" rel="external nofollow">hiring</a>). Additionally, it shows that it's essential to regularly test Wi-Fi products for security vulnerabilities, which can for instance be done when certifying them.
</p>

<p>
	To protect users, security updates were prepared during a 9-month-long coordinated disclosure that was supervised by the Wi-Fi Alliance and ICASI. If updates for your device are not yet available, you can <a href="https://www.fragattacks.com/#notpatched" rel="external nofollow">mitigate</a> some attacks (but not all) by assuring that websites use HTTPS and by assuring that your devices received all other available updates.
</p>

<h2>
	<a href="https://www.fragattacks.com/#demo" rel="external nofollow">DEMO</a>
</h2>

<p>
	The following video shows three examples of how an adversary can abuse the vulnerabilities. First, the aggregation design flaw is abused to intercept sensitive information (e.g. the victim's username and password). Second, it's shown how an adversary can exploit insecure internet-of-things devices by remotely turning on and off a smart power socket. Finally, it's demonstrated how the vulnerabilities can be abused as a stepping stone to launch advanced attacks. In particular, the video shows how an adversary can take over an outdated Windows 7 machine inside a local network.
</p>

<div>
	<div>
		<iframe allowfullscreen="" frameborder="0" title="YouTube video player" data-embed-src="https://www.youtube.com/embed/88YZ4061tYw?rel=0&amp;vq=hd720"></iframe>
	</div>
</div>

<p>
	As the demo illustrates, the Wi-Fi flaws can be abused in two ways. First, under the right conditions they can be abused to steal sensitive data. Second, an adversary can abuse the Wi-Fi flaws to attack devices in someone's home network.
</p>

<p>
	The biggest risk in practice is likely the ability to abuse the discovered flaws to attack devices in someone's home network. For instance, many smart home and <a href="https://en.wikipedia.org/wiki/Internet_of_things#Consumer_applications" rel="external nofollow">internet-of-things</a> devices are rarely updated, and Wi-Fi security is the last line of defense that prevents someone from attacking these devices. Unfortunately, due to the discover vulnerabilities, this last line of defense can now be bypassed. In the demo above, this is illustrated by remotely controlling a smart power plug and by taking over an outdated Windows 7 machine.
</p>

<p>
	The Wi-Fi flaws can also be abused to exfiltrate transmitted data. The demo shows how this can be abused to learn the username and password of the victim when they use the NYU website. However, when a website is configured with <a href="https://www.eff.org/deeplinks/2014/02/websites-hsts" rel="external nofollow">HSTS</a> to always use <a href="https://en.wikipedia.org/wiki/HTTPS" rel="external nofollow">HTTPS</a> as an extra layer of security, which nowadays <a href="https://www.troyhunt.com/padlocks-phishing-and-privacy-the-value-proposition-of-a-vpn/#1-https-still-has-a-long-way-to-go" rel="external nofollow">close</a> <a href="https://twitter.com/Scott_Helme/status/1305605547106983951" rel="external nofollow">to</a> <a href="https://w3techs.com/technologies/details/ce-hsts" rel="external nofollow">20%</a> of websites are, the transmitted data cannot be stolen. Additionally, several browsers now <a href="https://www.blog.google/products/chrome/milestone-chrome-security-marking-http-not-secure" rel="external nofollow">warn</a> the user when HTTPS is not being used. Finally, although <a href="https://www.usenix.org/conference/usenixsecurity21/presentation/oltrogge" rel="external nofollow">not always</a> perfect, recent mobile apps by default use HTTPS and therefore also use this extra protection.
</p>

<h2>
	<a href="https://www.fragattacks.com/#details" rel="external nofollow">DETAILS</a>
</h2>

<h3>
	<a href="https://www.fragattacks.com/#plaininject" rel="external nofollow">Plaintext injection vulnerabilities</a>
</h3>

<p>
	Several implementation flaws can be abused to easily inject frames into a protected Wi-Fi network. In particular, an adversary can often inject an unencrypted Wi-Fi frame by carefully constructing this frame. This can for instance be abused to intercept a client's traffic by tricking the client into using a <a href="https://www.fragattacks.com/#extradocs" rel="external nofollow">malicious DNS server</a> as shown in the <a href="https://www.fragattacks.com/#demo" rel="external nofollow">demo</a> (the intercepted traffic may have <a href="https://en.wikipedia.org/wiki/HTTPS" rel="external nofollow">another layer of protection</a> though). Against routers this can also be abused to <a href="https://www.fragattacks.com/#extadocs" rel="external nofollow">bypass the NAT/firewall</a>, allowing the adversary to subsequently attack devices in the local Wi-Fi network (e.g. attacking an outdated Windows 7 machine as shown in the <a href="https://www.fragattacks.com/#demo" rel="external nofollow">demo</a>).
</p>

<p>
	How can the adversary construct unencrypted Wi-Fi frames so they are accepted by a vulnerable device? First, certain Wi-Fi devices accept any unencrypted frame even when connected to a protected Wi-Fi network. This means the attacker doesn't have to do anything special! Two of out of four tested home routers were affected by this vulnerability, several internet-of-things devices were affected, and some smartphones were affected. Additionally, many Wi-Fi dongles on Windows will wrongly accept plaintext frames when they are split into several (plaintext) fragments.
</p>

<p>
	Additionally, certain devices accept plaintext aggregated frames that look like handshake messages. An adversary can exploit this by sending an aggregated frame whose starts resembles a handshake message and whose second subframe contains the packet that the adversary wants to inject. A vulnerable device will first interpret this frame as a handshake message, but will subsequently process it as an aggregated frame. In a sense, one part of the code will think the frame is a handshake message and will accept it even though it's not encrypted. Another part of the code will instead see it as an aggregated frame and will process the packet that the adversary wants to inject.
</p>

<div>
	<div>
		<img data-ratio="55.50" alt="tenor.gif" src="https://www.fragattacks.com/images/tenor.gif" />
		<p>
			A plaintext aggregated frame that also looks like a handshake message ☺
		</p>
	</div>
</div>

<p>
	Finally, several devices process broadcasted fragments as normal unfragmented frames. More problematic, some devices accept broadcast fragments even when sent unencrypted. An attacker can abuse this to inject packets by encapsulating them in the second fragment of a plaintext broadcast frame.
</p>

<h3>
	<a href="https://www.fragattacks.com/#aggregationattack" title="CVE-2020-24588" rel="external nofollow">Design flaw: aggregation attack</a>
</h3>

<p>
	The first design flaw is in the frame aggregation feature of Wi-Fi. This feature increases the speed and throughput of a network by combining small frames into a larger aggregated frame. To implement this feature, the header of each frame contains a flag that indicates whether the (encrypted) transported data contains a single or aggregated frame. This is illustrated in the following figure:
</p>

<div>
	 
</div>

<p>
	Unfortunately, this "is aggregated" flag is not authenticated and can be modified by an adversary, meaning a victim can be tricked into processing the encrypted transported data in an unintended manner. An adversary can abuse this to inject arbitrary network packets by tricking the victim into connecting to their server and then setting the "is aggregated" flag of carefully selected packets. Practically all tested devices were vulnerable to this attack. The ability to inject packets can in turn be abused to intercept a victim’s traffic by making it use a malicious DNS server (see the <a href="https://www.fragattacks.com/#demo" rel="external nofollow">demo</a>).
</p>

<p>
	This design flaw can be fixed by authenticating the "is aggregated" flag. The Wi-Fi standard already contains a feature to authenticate this flag, namely requiring SPP A-MSDU frames, but this defense is not backwards-compatible and not supported in practice. Attacks can also be mitigated using an ad-hoc fix, though new attacks may remain possible.
</p>

<h3>
	<a href="https://www.fragattacks.com/#mixedkeyattack" title="CVE-2020-24587" rel="external nofollow">Design flaw: mixed key attack</a>
</h3>

<p>
	The second design flaw is in the frame fragmentation feature of Wi-Fi. This feature increases the reliability of a connection by splitting large frames into smaller fragments. When doing this, every fragment that belongs to the same frame is encrypted using the same key. However, receivers are not required to check this and will reassemble fragments that were decrypted using different keys. Under rare conditions this can be abused to exfiltrate data. This is accomplished by mixing fragments that are encrypted under different keys, as illustrated in the following figure:
</p>

<div>
	 
</div>

<p>
	In the above figure, the first fragment is decrypted using a different key than the second fragment. Nevertheless, the victim will reassemble both fragments. In practice this allows an adversary to exfiltrate selected client data.
</p>

<p>
	This design flaw can be fixed in a backwards-compatible manner by only reassembling fragments that were decrypted using the same key. Because the attack is only possible under rare conditions it is considered a theoretical attack.
</p>

<h3>
	<a href="https://www.fragattacks.com/#fragcacheattack" title="CVE-2020-24586" rel="external nofollow">Design flaw: fragment cache attack</a>
</h3>

<p>
	The third design flaw is also in Wi-Fi's frame fragmentation feature. The problem is that, when a client disconnects from the network, the Wi-Fi device is not required to remove non-reassembled fragments from memory. This can be abused against hotspot-like networks such as <a href="https://en.wikipedia.org/wiki/Eduroam" rel="external nofollow">eduroam and govroam</a> and against enterprise network where users distrust each other. In those cases, selected data sent by the victim can be exfiltrated. This is achieved by injecting a malicious fragment in the memory (i.e. fragment cache) of the access point. When the victim then connects to the access point and sends a fragmented frame, selected fragments will be combined (i.e. reassembled) with the injected fragment of the adversary. This is illustrated in the following figure:
</p>

<div>
	 
</div>

<p>
	In the above figure, the adversary injects the first fragment into the fragment cache of the access point. After the adversary disconnects the fragment stays in the fragment cache and will be reassembled with a fragment of the victim. If the victim sends fragmented frames, which appears uncommon in practice, this can be abused to exfiltrate data.
</p>

<p>
	This design flaw can be fixed in a backwards-compatible manner by removing fragments from memory whenever disconnecting or (re)connecting to a network.
</p>

<h3>
	<a href="https://www.fragattacks.com/#codeflaws" rel="external nofollow">Other implementation vulnerabilities</a>
</h3>

<p>
	Some routers will forward handshake frames to another client even when the sender hasn't authenticated yet. This vulnerability allows an adversary to perform the aggregation attack, and inject arbitrary frames, without user interaction.
</p>

<p>
	Another extremely common implementation flaw is that receivers do not check whether all fragments belong to the same frame, meaning an adversary can trivially forge frames by mixing the fragments of two different frames.
</p>

<p>
	Additionally, against several implementations it is possible to mix encrypted and plaintext fragments.
</p>

<p>
	Finally, some devices don't support fragmentation or aggregation, but are still vulnerable to attacks because they process fragmented frames as full frames. Under the right circumstances this can be abused to inject packets.
</p>

<h3>
	<a href="https://www.fragattacks.com/#cves" rel="external nofollow">Assigned CVE identifiers</a>
</h3>

<p>
	An overview of all assigned Common Vulnerabilities and Exposures (CVE) identifiers can be found <a href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" rel="external nofollow">on GitHub</a>. At the time of writing, ICASI has a <a href="https://www.icasi.org/aggregation-fragmentation-attacks-against-wifi/" rel="external nofollow">succinct overview</a> containing references to additional info from vendors (the CVE links below might only become active after a few days). Summarized, the design flaws were assigned the following CVEs:
</p>

<ul>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588" rel="external nofollow">CVE-2020-24588</a>: aggregation attack (accepting non-SPP A-MSDU frames).
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587" rel="external nofollow">CVE-2020-24587</a>: mixed key attack (reassembling fragments encrypted under different keys).
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586" rel="external nofollow">CVE-2020-24586</a>: fragment cache attack (not clearing fragments from memory when (re)connecting to a network).
	</li>
</ul>

<p>
	Implementation vulnerabilities that allow the trivial injection of plaintext frames in a protected Wi-Fi network are assigned the following CVEs:
</p>

<ul>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145" rel="external nofollow">CVE-2020-26145</a>: Accepting plaintext broadcast fragments as full frames (in an encrypted network).
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26144" rel="external nofollow">CVE-2020-26144</a>: Accepting plaintext A-MSDU frames that start with an RFC1042 header with EtherType EAPOL (in an encrypted network).
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26140" rel="external nofollow">CVE-2020-26140</a>: Accepting plaintext data frames in a protected network.
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26143" rel="external nofollow">CVE-2020-26143</a>: Accepting fragmented plaintext data frames in a protected network.
	</li>
</ul>

<p>
	Other implementation flaws are assigned the following CVEs:
</p>

<ul>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139" rel="external nofollow">CVE-2020-26139</a>: Forwarding EAPOL frames even though the sender is not yet authenticated (should only affect APs).
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26146" rel="external nofollow">CVE-2020-26146</a>: Reassembling encrypted fragments with non-consecutive packet numbers.
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147" rel="external nofollow">CVE-2020-26147</a>: Reassembling mixed encrypted/plaintext fragments.
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26142" rel="external nofollow">CVE-2020-26142</a>: Processing fragmented frames as full frames.
	</li>
	<li>
		<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141" rel="external nofollow">CVE-2020-26141</a>: Not verifying the TKIP MIC of fragmented frames.
	</li>
</ul>

<p>
	For each implementation vulnerability we listed the reference CVE identifier. Although each affected codebase normally receives a unique CVE, the consensus was that using the same CVE across different codebases would make communication easier. For instance, by tying one CVE to each vulnerability, a customer can now ask a vendor whether their product is affected by a specific CVE. Using a unique CVE for each codebase would complicate such questions and cause confusion.
</p>

<h2>
	<a href="https://www.fragattacks.com/#paper" rel="external nofollow">PAPER</a>
</h2>

<p>
	Our paper behind the attack is titled <a href="https://papers.mathyvanhoef.com/usenix2021.pdf" rel="external nofollow">Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation</a> and will be presented at <a href="https://www.usenix.org/conference/usenixsecurity21/presentation/vanhoef" rel="external nofollow">USENIX Security</a>. You can use the following bibtex entry to cite our paper:
</p>

<div>
	<pre>
@inproceedings{vanhoef-usenix2021-fragattacks,
  author = {Mathy Vanhoef},
  title = {Fragment and Forge: Breaking {Wi-Fi} Through Frame Aggregation and Fragmentation},
  booktitle = {Proceedings of the 30th {USENIX} Security Symposium},
  year = {2021},
  month = {August},
  publisher = {{USENIX} Association}
}</pre>
</div>

<h3>
	<a href="https://www.fragattacks.com/#usenixpres" rel="external nofollow">USENIX Security Presentation</a>
</h3>

<p>
	The pre-recorded presentation made for USENIX Security can already be viewed online. Note that the target audience of this presentation are academics and IT professionals:
</p>

<div>
	<div>
		<iframe allowfullscreen="" frameborder="0" title="YouTube video player" data-embed-src="https://www.youtube.com/embed/OJ9nFeuitIU?rel=0&amp;vq=hd720"></iframe>
	</div>
</div>

<h3>
	<a href="https://www.fragattacks.com/#extadocs" rel="external nofollow">Extra Documents</a>
</h3>

<ul>
	<li>
		An <a href="https://papers.mathyvanhoef.com/fragattacks-overview.pdf" rel="external nofollow">overview</a> of all attacks and their preconditions. It also contains two extra examples on how an adversary can: (1) abuse packet injection vulnerabilities to make a victim use a malicious DNS; and (2) how packet injection can be abused to bypass the NAT/firewall of a router.
	</li>
	<li>
		<a href="https://papers.mathyvanhoef.com/fragattacks-slides-amsdu.pdf" rel="external nofollow">Slides</a> illustrating how the aggregation attack (CVE-2020-24588) works in practice. Performing this attack requires tricking the victim into connecting to the adversary's server. This can be done by making the victim download an image from the adversary’s server. Note that JavaScript code execution on the victim is not required.
	</li>
	<li>
		<a href="https://papers.mathyvanhoef.com/fragattacks-slides-2021-03-8.pdf" rel="external nofollow">Detailed slides</a> giving an in-depth explanation of each discovered vulnerability.
	</li>
	<li>
		<a href="https://papers.mathyvanhoef.com/fragattacks-slides-summary-2021-03-8.pdf" rel="external nofollow">Overview slides</a> illustrating only the root cause of each discovered vulnerability.
	</li>
</ul>

<h2>
	<a href="https://www.fragattacks.com/#tools" rel="external nofollow">TOOLS</a>
</h2>

<p>
	A <a href="https://github.com/vanhoefm/fragattacks" rel="external nofollow">tool was made</a> that can test if clients or APs are affected by the discovered design and implementations flaws. It can test home networks and enterprise networks where authentication is done using, e.g., PEAP-MSCHAPv2 or EAP-TLS. The tool supports over 45 test cases and requires modified drivers in order to reliable test for the discovered vulnerabilities. Without modified drivers, one may wrongly conclude that a device is not affected while in reality it is.
</p>

<p>
	A live USB image is <a href="https://github.com/vanhoefm/fragattacks#id-live-image" rel="external nofollow">also available</a>. This image contains pre-installed modified drivers, modified firmware for certain Atheros USB dongles, and a pre-configured Python environment for the tool. Using a live image is useful when you cannot install the modified drivers natively (and using a virtual machine can be unreliable for some network cards).
</p>

<p>
	Apart from a tool to test if a device is vulnerable I also made proof-of-concepts to exploit weaknesses. Because not all devices currently have received updates these attacks scripts will be released at a later point if deemed useful.
</p>

<h2>
	<a href="https://www.fragattacks.com/#faq" rel="external nofollow">Q&amp;A</a>
</h2>

<ul>
	<li>
		<a href="https://www.fragattacks.com/#contact" rel="external nofollow">How can I contact you?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#hiring" rel="external nofollow">Are you looking for PhD students?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#images" rel="external nofollow">Can I reuse the images on this website?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#ieeenoticed" rel="external nofollow">Why did nobody notice the aggregation design flaw before?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#whynotadopted" rel="external nofollow">Why was the defense against the aggregation attack (CVE-2020-24588) not adopted?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#notpatched" rel="external nofollow">My device isn't patched yet, what can I do?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#whyimportant" rel="external nofollow">Why is Wi-Fi security important? We already have HTTPS.</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#vpn" rel="external nofollow">Will using a VPN prevent attacks?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#howfound" rel="external nofollow">How did you discover this?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#allaffected" rel="external nofollow">How sure are you that all Wi-Fi devices are affected?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#istrivial" rel="external nofollow">Does this mean every Wi-Fi device is trivial to attack?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#usagefrag" rel="external nofollow">How many networks use fragmentation?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#usagerenew" rel="external nofollow">How many networks periodically refresh the pairwise session key?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#abusetools" rel="external nofollow">Isn't is irresponsible to release tools to perform the attacks?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#attacktools" rel="external nofollow">Where are all the attack tools?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#captures" rel="external nofollow">Do you have example network captures of the vulnerabilities?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#maintaindriver" rel="external nofollow">How long will you maintain the driver patches needed to run the test scripts?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#nonsecdesign" rel="external nofollow">Why are so many implementations vulnerable to be non-consecutive PN attack?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#mixeddesign" rel="external nofollow">Why are so many implementations vulnerable to the mixed plaintext/encrypted fragment attack?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#cachenotmixed" rel="external nofollow">Can an implementation be vulnerable to a cache attack without being vulnerable to a mixed key attack?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#mixedbackward" rel="external nofollow">Can the mixed-key attack be prevented in a backward-compatible manner?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#tkip" rel="external nofollow">Is the old WPA-TKIP protocol also affected by the design flaws?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#wep" rel="external nofollow">Is the ancient WEP protocol also affected by the design flaws?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#fragdelays" rel="external nofollow">Can fragmentation attacks be preventing by disallowing small delays between fragments?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#patchlinux" rel="external nofollow">Are patches for Linux available?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#plainothers" rel="external nofollow">Did others also discover the plaintext injection issue (CVE-2020-26140)?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#samecves" rel="external nofollow">Why do you use the same CVE for implementation issues in multiple different codebases?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#longembargo" rel="external nofollow">Why was the embargo so long?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#detectleaks" rel="external nofollow">How did you monitor for leaks during the embargo?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#beingexploit" rel="external nofollow">Are these vulnerabilities being exploited in practice?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#microsoft" rel="external nofollow">Why did Microsoft already fix certain vulnerabilities on March 9, 2021?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#apfragasfull" rel="external nofollow">Is the "Treating fragments as full frames" flaw (CVE-2020-26142) also applicable to APs?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#aprecievebcast" rel="external nofollow">Can APs be vulnerable to attacks that send broadcast frames?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#whyold" rel="external nofollow">Why are some of the tested devices so old?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#forcebaddns" rel="external nofollow">How did you make macOS switch to the malicious DNS server in the demonstration?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#nyuhsts" rel="external nofollow">Isn't nyu.edu using HSTS to prevent these kind of attacks?</a>
	</li>
	<li>
		<a href="https://www.fragattacks.com/#bluekeep" rel="external nofollow">How do I reproduce the BlueKeep attack shown in the demonstration?</a>
	</li>
</ul>

<h3>
	<a href="https://www.fragattacks.com/#contact" rel="external nofollow">How can I contact you?</a>
</h3>

<p>
	You can reach Mathy Vanhoef on twitter at <a href="https://www.twitter.com/vanhoefm" rel="external nofollow">@vanhoefm</a> or by emailing <a href="mailto:mathy.vanhoef@nyu.edu" rel="">mathy.vanhoef@nyu.edu</a>.
</p>

<h3>
	<a href="https://www.fragattacks.com/#hiring" rel="external nofollow">Are you looking for PhD students?</a>
</h3>

<p>
	Yes! Mathy Vanhoef will be starting as a professor at KU Leuven University (Belgium) later this year and is looking for a PhD student. The precise topic you want to work on can be discussed. If you're a master student at KU Leuven you can also contact me to discuss a Master's thesis topic. Note that the <a href="https://distrinet.cs.kuleuven.be/jobs/" rel="external nofollow">DistriNet</a> group at KU Leuven is also recruiting in security-related research fields.
</p>

<p>
	If you want to do network research at New York University Abu Dhabi in the <a href="https://nyuad.nyu.edu/en/research/faculty-labs-and-projects/cybersecurity-and-privacy-lab.html" rel="external nofollow">Cyber Security &amp; Privacy (CSP)</a> team where the FragAttacks research was carried out, you can contact <a href="https://poepper.net/" rel="external nofollow">Christina Pöpper</a>.
</p>

<h3>
	<a href="https://www.fragattacks.com/#images" rel="external nofollow">Can I reuse the images on this website?</a>
</h3>

<p>
	Yes, you can use the <a href="https://www.fragattacks.com/images/logo.png" rel="external nofollow">logo</a>, illustrations of the <a href="https://www.fragattacks.com/images/aggregated.png" rel="external nofollow">aggregation</a> design flaw (<a href="https://www.fragattacks.com/images/aggregatedsmall.png" rel="external nofollow">mobile version</a>), illustrations of the <a href="https://www.fragattacks.com/images/mixedkey.png" rel="external nofollow">mixed key</a> design flaw (<a href="https://www.fragattacks.com/images/mixedkeysmall.png" rel="external nofollow">mobile version</a>), and illustrations of the <a href="https://www.fragattacks.com/images/fragmentcache.png" rel="external nofollow">fragment cache</a> design flaw (<a href="https://www.fragattacks.com/images/fragmentcachesmall.png" rel="external nofollow">mobile version</a>).
</p>

<p>
	Thanks goes to <a href="https://www.thehappylee.com/about" rel="external nofollow">Darlee Urbiztondo</a> for designing the logo. You can find more of her awesome graphic works <a href="https://www.thehappylee.com/graphicdesign" rel="external nofollow">here</a>.
</p>

<h3>
	<a href="https://www.fragattacks.com/#ieeenoticed" rel="external nofollow">Why did nobody notice the aggregation design flaw before?</a>
</h3>

<p>
	When the 802.11n amendment was being written in 2007, which introduced supported for aggregated (A-MSDU) frames, <a href="https://mentor.ieee.org/802.11/dcn/07/11-07-0397-07-000n-msdu-protection.doc" rel="external nofollow">several IEEE members</a> noticed that the "is aggregated" flag was not authenticated. Unfortunately, many products already implemented a draft of the 802.11n amendment, meaning this problem had to be addressed in a backwards-compatible manner. The decision was made that devices would advertise whether they are capable of authenticating the "is aggregated" flag. Only when devices implement and advertise this capability is the "is aggregated" flag protected. Unfortunately, in 2020 not a single tested device supported this capability, likely because it was considered hard to exploit. <a href="https://mentor.ieee.org/802.11/dcn/07/11-07-0397-07-000n-msdu-protection.doc" rel="external nofollow">To quote</a> a remark made back in 2007: "While it is hard to see how this can be exploited, it is clearly a flaw that is capable of being fixed."
</p>

<p>
	In other words, people did notice this vulnerability and a defense was standardized, but in practice the defense was never adopted. This is a good example that security defenses must be adopted before attacks become practical.
</p>

<h3>
	<a href="https://www.fragattacks.com/#whynotadopted" rel="external nofollow">Why was the defense against the aggregation attack (CVE-2020-24588) not adopted?</a>
</h3>

<p>
	Likely because it was only considered a theoretic vulnerability when the defense was created. <a href="https://mentor.ieee.org/802.11/dcn/07/11-07-0397-07-000n-msdu-protection.doc" rel="external nofollow">To quote</a> a remark made back in 2007: "While it is hard to see how this can be exploited, it is clearly a flaw that is capable of being fixed."
</p>

<p>
	Additionally, the threat model that was used in the aggregation attack, were the victim is induced into connecting to the adversary's server, only become widely accepted in 2011 after the disclosure of the <a href="https://en.wikipedia.org/wiki/Transport_Layer_Security#BEAST_attack" rel="external nofollow">BEAST</a> attack. In other words, the threat model was not yet widely known back in 2007 when the IEEE added the optional feature that would have prevented the attack. And even after this threat model became more common, the resulting attack isn't obvious.
</p>

<h3>
	<a href="https://www.fragattacks.com/#notpatched" rel="external nofollow">My device isn't patched yet, what can I do?</a>
</h3>

<p>
	First, it's always good to remember general security best practices: update your devices, don't reuse your passwords, make sure you have backups of important data, don't visit shady websites, and so on.
</p>

<p>
	 
</p>

<p>
	In regards to the discovered Wi-Fi vulnerabilities, you can mitigate attacks that exfiltrate sensitive data by double-checking that websites you are visiting <a href="https://www.blog.google/products/chrome/milestone-chrome-security-marking-http-not-secure" rel="external nofollow">use HTTPS</a>. Even better, you can install the <a href="https://www.eff.org/https-everywhere" rel="external nofollow">HTTPS Everywhere</a> plugin. This plugin forces the usage of HTTPS on websites that are known to support it.
</p>

<p>
	To mitigate attacks where your router's NAT/firewall is bypassed and devices are directly attacked, you must assure that all your devices are updated. Unfortunately, not all products regularly receive updates, in particular smart or internet-of-things devices, in which case it is difficult (if not impossible) to properly secure them.
</p>

<p>
	More technically, the impact of attacks can also be reduced by manually configuring your DNS server so that it cannot be poisoned. Specific to your Wi-Fi configuration, you can mitigate attacks (but not fully prevent them) by disabling fragmentation, disabling pairwise rekeys, and disabling dynamic fragmentation in Wi-Fi 6 (802.11ax) devices.
</p>

<h3>
	<a href="https://www.fragattacks.com/#whyimportant" rel="external nofollow">Why is Wi-Fi security important? We already have HTTPS.</a>
</h3>

<p>
	These days a lot of websites and apps use <a href="https://en.wikipedia.org/wiki/HTTPS" rel="external nofollow">HTTPS</a> to encrypt data. When using HTTPS, an adversary cannot see the data you are transmitting even when you are connected to an open Wi-Fi network. This also means that you can safely use open Wi-Fi hotspots as long as you keep your devices up-to-date and as long as you assure that websites are using HTTPS. Unfortunately, not all websites require the usage of HTTPS (i.e. they're not using <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="external nofollow">HSTS</a>), meaning they remain vulnerable to possible attacks.
</p>

<p>
	At home, the security of your Wi-Fi network is also essential. An insecure network means that others might be able to connect to the internet through your home. Additionally, more and more devices are using Wi-Fi to transfer personal files in your local network without an extra layer of protection (e.g. when printing files, smart display screens, when sending files to a local backup storage, digital photo stands, and so on). More problematic, a lot of internet-of-things devices have tons of security vulnerabilities that can be exploited if an adversary can communicate with them. The main thing that prevents an adversary from exploiting these insecure internet-of-things devices is the security of your Wi-Fi network. It therefore remains essential to have strong encryption and authentication at the Wi-Fi layer.
</p>

<p>
	At work, the security of Wi-Fi is also essential for the same reasons as mentioned above. Additionally, many companies will automatically allow access to sensitive services when a user (or adversary) is able to connect to the Wi-Fi network. Therefore strong Wi-Fi security is also essential in a work setting.
</p>

<h3>
	<a href="https://www.fragattacks.com/#vpn" rel="external nofollow">Will using a VPN prevent attacks?</a>
</h3>

<p>
	Using a VPN can prevent attacks where an adversary is trying to exfiltrate data. It will not prevent an adversary from bypassing your router's NAT/firewall to directly attack devices.
</p>

<h3>
	<a href="https://www.fragattacks.com/#howfound" rel="external nofollow">How did you discover this?</a>
</h3>

<p>
	The seeds of this research were already planted while I was investigating the <a href="https://krackattacks.com/" rel="external nofollow">KRACK attack</a>. At that time, on 8 June 2017 to be precise, I wrote down some notes to further investigate (de)fragmentation support in Linux. In particular, I thought there might be an implementation vulnerability in Linux. However, a single unconfirmed implementation flaw isn't too spectacular research-wise, so after disclosing the KRACK attack I decided to work on other research instead. The idea of inspecting (de)fragmentation in Wi-Fi, and determining whether there really was a vulnerability or not, was always at the back of my mind though.
</p>

<p>
	Fast-forward three years later, and after gaining some additional ideas to investigate, closer inspection confirmed some of my hunches and also revealed that these issues were more widespread than I initially assumed. And with some extra insights I also discovered all the other vulnerabilities. Interestingly, this also shows the advantage of fleshing out ideas before rushing to publish (though actually finishing the paper before submission was still a race against time..).
</p>

<h3>
	<a href="https://www.fragattacks.com/#allaffected" rel="external nofollow">How sure are you that all Wi-Fi devices are affected?</a>
</h3>

<p>
	In experiments on more than 75 devices, all of them were vulnerable to one or more of the discovered attacks. I'm curious myself whether all devices in the whole world are indeed affected though! To find this out, if you find a device that isn't affected by at least one of the discovered vulnerabilities, let me know.
</p>

<p>
	Also, if your company provides Wi-Fi devices and you think that your product was not affected by any of the discovered vulnerabilities, you can send your product to me. Once I confirmed that it indeed was not affected by any vulnerabilities the name of your product and company will be put here! Note that I do need a method to assure that I'm indeed testing a version of the product that was available before the disclosure of the vulnerabilities (and that you didn't silently patch some vulnerabilities).
</p>

<h3>
	<a href="https://www.fragattacks.com/#istrivial" rel="external nofollow">Does this mean every Wi-Fi device is trivial to attack?</a>
</h3>

<p>
	The design issues are, on their own, tedious to exploit in practice. Unfortunately, some of the implementation vulnerabilities are common and trivial to exploit. Additionally, by combining the design issues with certain implementation issues, the resulting attacks become more serious. This means the impact of our findings depends on the specific target. Your vendor can inform you what the precise impact is for specific devices. In other words, for some devices the impact is minor, while for others it's disastrous.
</p>

<h3>
	<a href="https://www.fragattacks.com/#usagefrag" rel="external nofollow">How many networks use fragmentation?</a>
</h3>

<p>
	By default devices don't send fragmented frames. This means that the mixed key attack and the fragment cache attack, on their own, will be hard to exploit in practice, unless Wi-Fi 6 is used. When using Wi-Fi 6, which is based on the 802.11ax standard, a device may dynamically fragment frames to fill up available airtime.
</p>

<h3>
	<a href="https://www.fragattacks.com/#usagerenew" rel="external nofollow">How many networks periodically refresh the pairwise session key?</a>
</h3>

<p>
	By default access points don't renew the pairwise session key, even though some may periodically renew the group key. This means that the default mixed key attack as described in the paper is only possible against networks that deviate from this default setting.
</p>

<h3>
	<a href="https://www.fragattacks.com/#abusetools" rel="external nofollow">Isn't is irresponsible to release tools to perform the attacks?</a>
</h3>

<p>
	The test tool that we released can only be used to test whether a device is vulnerable. It cannot be used to perform attacks: an adversary would have to write their own tools for that. This approach enables network administrators to test if devices are affected while reducing the chance of someone abusing the released code.
</p>

<h3>
	<a href="https://www.fragattacks.com/#attacktools" rel="external nofollow">Where are all the attack tools?</a>
</h3>

<p>
	The code that has currently been released focusses on detecting vulnerable implementations. The proof-of-concepts scripts that perform actual attacks are not released to provide everyone with more time to implement and deploy patches. Once a large enough fraction of devices has been patched, and if deemed necessary and/or beneficial, the attack script will be publicly released as well.
</p>

<h3>
	<a href="https://www.fragattacks.com/#captures" rel="external nofollow">Do you have example network captures of the vulnerabilities?</a>
</h3>

<p>
	There are example <a href="https://github.com/vanhoefm/fragattacks/tree/master/example-pcaps" rel="external nofollow">network captures</a> of the <a href="https://www.fragattacks.com/#tools" rel="external nofollow">test tool</a> that illustrate the root causes of several vulnerabilities.
</p>

<h3>
	<a href="https://www.fragattacks.com/#maintaindriver" rel="external nofollow">How long will you maintain the driver patches needed to run the test scripts?</a>
</h3>

<p>
	The modifications to certain drivers have been submitted upstream to Linux meaning they will be maintained by the Linux developers themselves. The patches to the Intel driver have not been submitted upstream because they're a bit hacky. Concretely, this means that drivers such as ath9k_htc will be supported out of the box, while for Intel devices you will have to use patched drivers and I'm not sure how much time I'll have to maintain those.
</p>

<h3>
	<a href="https://www.fragattacks.com/#nonsecdesign" rel="external nofollow">Why are so many implementations vulnerable to be non-consecutive PN attack?</a>
</h3>

<p>
	That's a good question. I'm not sure why so many developers missed this. This widespread implementation vulnerability does highlight that leaving important cryptographic operations up to developers is not ideal. Put another way, it might have been better if the standard required an authenticity check over the reassembled frame instead. That would also better follow the principle of authenticated encryption.
</p>

<h3>
	<a href="https://www.fragattacks.com/#mixeddesign" rel="external nofollow">Why are so many implementations vulnerable to the mixed plaintext/encrypted fragment attack?</a>
</h3>

<p>
	The 802.11 standard states in section 10.6: "If security encapsulation has been applied to the fragment, it shall be deencapsulated and decrypted before the fragment is used for defragmentation of the MSDU or MMPDU". There is unfortunately no warning that unencrypted fragments should be dropped. And there are no recommend checks that should be performed when reassembling two (decrypted) fragments.
</p>

<h3>
	<a href="https://www.fragattacks.com/#cachenotmixed" rel="external nofollow">Can an implementation be vulnerable to a cache attack without being vulnerable to a mixed key attack?</a>
</h3>

<p>
	Yes, although this is unlikely to occur in practice. More technically, let's assume that an implementation tries to prevent mixed key attacks by: (1) assigning an unique key ID to every fragment; (2) incrementing this key ID whenever the pairwise transient key (PTK) is updated; and (3) assuring all fragments were decrypted under the same key ID. Unfortunately, in that case cache attacks may still be feasible. In particular, if under this defense key IDs are reused after (re)connecting to a network, for example because they are reset to zero, fragments that are decrypted using a different key may still be assigned the same key ID. As a result, cache attacks remain possible, because the fragments will still be reassembled as they have the same key ID.
</p>

<h3>
	<a href="https://www.fragattacks.com/#mixedbackward" rel="external nofollow">Can the mixed-key attack be prevented in a backward-compatible manner?</a>
</h3>

<p>
	Strictly speaking not, because the 802.11 standard does not explicitly require that a sender encrypts all fragments of a specific frame under the same key. Fortunately, all implementations that we tested did encrypt all fragments using the same key, at least under the normal circumstances that we tested, meaning in practice the mixed key attack can be prevented without introducing incompatibilities.
</p>

<h3>
	<a href="https://www.fragattacks.com/#tkip" rel="external nofollow">Is the old WPA-TKIP protocol also affected by the design flaws?</a>
</h3>

<p>
	Strictly speaking not, though implementations can still be vulnerable. Note that TKIP should not be used because it is affected by other more serious security flaws. Additionally, TKIP has been <a href="https://www.wi-fi.org/file/technical-note-removal-of-tkip-from-wi-fi-devices" rel="external nofollow">deprecated</a> by the Wi-Fi Alliance.
</p>

<p>
	The TKIP protocol is not affected by the fragmentation-based design flaws (CVE-2020-24587 and CVE-2020-24586) because it verifies the authenticity of the full reassembled frame. This is in contrast to CCMP and GCMP, which only verify the authenticity of individual fragments, and rely on sequential packet numbers to securely reassemble the individual (decrypted) fragments.
</p>

<p>
	Additionally, TKIP is not affected by the aggregation design flaw (CVE-2020-24588) because a receiver is supposed to drop A-MSDUs that are encrypted using TKIP. Indeed, in Section "12.9.2.8 Per-MSDU/Per-A-MSDU Rx pseudocode" of the <a href="https://standards.ieee.org/standard/802_11-2016.html" rel="external nofollow">802.11-2016</a> standard it's specified that when using TKIP only normal MSDU frames are accepted.
</p>

<p>
	Unfortunately, some implementations don't verify the authenticity of fragmented TKIP frames, and some accept aggregated frames (i.e. A-MSDUs) even when encrypted using TKIP. This unfortunately means that in practice TKIP implementations may still be vulnerable.
</p>

<h3>
	<a href="https://www.fragattacks.com/#wep" rel="external nofollow">Is the ancient WEP protocol also affected by the design flaws?</a>
</h3>

<p>
	Yes. The WEP protocol is so horrible that it doesn't even try to verify the authenticity of fragmented frames. This means an adversary can trivially perform aggregation-based attacks against WEP.
</p>

<p>
	Similar to TKIP, the WEP protocol is not affected by the aggregation design flaw (CVE-2020-24588) because a receiver is supposed to drop A-MSDUs that are encrypted using WEP. Nevertheless, in practice several WEP implementations do accept A-MSDUs and therefore are still vulnerable.
</p>

<p>
	Finally, in case you've been living under a rock, stop using WEP, it's known to be a <a href="https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Weak_security" rel="external nofollow">horrible</a> security protocol.
</p>

<h3>
	<a href="https://www.fragattacks.com/#fragdelays" rel="external nofollow">Can fragmentation attacks be preventing by disallowing small delays between fragments?</a>
</h3>

<p>
	This would make exploiting possible vulnerabilities harder and perhaps in some cases practically infeasible. Unfortunately this doesn't provide any guarantees though. I therefore recommend to fix the root cause instead.
</p>

<h3>
	<a href="https://www.fragattacks.com/#patchlinux" rel="external nofollow">Are patches for Linux available?</a>
</h3>

<p>
	Yes! During the embargo I helped write some patches for the Linux kernel. This means an updated Linux kernel should (soon) be available for actively supported Linux distributions.
</p>

<h3>
	<a href="https://www.fragattacks.com/#plainothers" rel="external nofollow">Did others also discover the plaintext injection issue (CVE-2020-26140)?</a>
</h3>

<p>
	During the embargo I was made aware that <a href="https://www.synopsys.com/blogs/software-security/cyrc-advisory-sept2020/" rel="external nofollow">Synopsys also discovered</a><a rel=""> the plaintext injection vulnerability (CVE-2020-26140) in access points. They found that Mediatek, Realtek, and Qualcomm were affected, and to cover these three implementations the identifiers </a><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-18989" rel="external nofollow">CVE-2019-18989</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-18990" rel="external nofollow">CVE-2019-18990</a>, and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-18991" rel="external nofollow">CVE-2019-18991</a> were respectively assigned.
</p>

<p>
	During the FragAttacks research I found that the same vulnerability was (still) present in other access points and that clients can be vulnerable to a similar attack. Additionally, and somewhat surprisingly, I also found that some devices reject normal (non-fragmented) plaintext frames but do accept fragmented plaintext frames (CVE-2020-26143).
</p>

<h3>
	<a href="https://www.fragattacks.com/#samecves" rel="external nofollow">Why do you use the same CVE for implementation issues in multiple different codebases?</a>
</h3>

<p>
	Implementation-specific vulnerabilities usually get their own independent CVE identifier for each different codebase. However, because the same implementation issues seem to be present across multiple vendors it would make more sense to have a single CVE identifier for each common implementation issue. After all, the main purpose of CVE identifiers is to provide a single, common ID to be used across vendors to identify the same vulnerability. We therefore think it makes sense to assign only a single CVE identifier to each implementation issues. This enables vendors and customers to easily reference an implementation vulnerability and, for instance, check whether certain products are affected by one of the discovered vulnerabilities.
</p>

<h3>
	<a href="https://www.fragattacks.com/#longembargo" rel="external nofollow">Why was the embargo so long?</a>
</h3>

<p>
	The disclosure was delayed by two months in consensus with ICASI and the Wi-Fi Alliance. The decision on whether to disclose fast, or to provide more time to write and create patches, wasn't easy. At the time, the risk of leaks appeared low, and the advantage of delaying appeared high. Additionally, we were prepared to immediately disclose in case details would accidently leak publicly. Another aspect that influenced my decision was the current situation, meaning COVID-19, which among other things made it harder to safely get access to physical places/labs to test patches.
</p>

<h3>
	<a href="https://www.fragattacks.com/#detectleaks" rel="external nofollow">How did you monitor for leaks during the embargo?</a>
</h3>

<p>
	During the last two months of the embargo, we were prepared to make the research public whenever information would seemed to be leaking. To detect leaks I personally searched for relevant keywords (CVE numbers, paper title, script names) on Google and social media such as Twitter. The Wi-Fi Alliance and ICASI were also monitoring for leaks (e.g. if questions came from people that shouldn't have known about it). This can detect innocent leaks. Detecting malicious leaks or usage of the vulnerabilities in stealthy attacks is a much harder problem (if even possible at all).
</p>

<p>
	If you know about cases where some information was (accidently) leaked, it would be useful to know about that so that I can better estimate the impact of having long embargos. Any information you provide about this will remain confidential. This information will help me in future decision when weighing the option of a longer embargo versus disclosing research even when several vendors don't have patches ready (i.e. it won't be used to point fingers).
</p>

<h3>
	<a href="https://www.fragattacks.com/#beingexploit" rel="external nofollow">Are these vulnerabilities being exploited in practice?</a>
</h3>

<p>
	Not that we are aware of. Because some of the design flaws took so long to discover my hunch is that those have not been previously exploited in the wild. But it is difficult to monitor whether one of the discovered vulnerabilities have been exploited in the past or are currently being exploited. So it is hard to give a definite answer to this question.
</p>

<h3>
	<a href="https://www.fragattacks.com/#microsoft" rel="external nofollow">Why did Microsoft already fix certain vulnerabilities on March 9, 2021?</a>
</h3>

<p>
	The original disclosure date was March 9, 2021. Roughly one week beforehand it was decided to <a href="https://www.fragattacks.com/#longembargo" rel="external nofollow">delay the disclosure</a>. At this time Microsoft had already committed to shipping certain patches on March 9. I agreed that already releasing certain patches without providing information about the vulnerabilities was, at that point, an acceptable risk. Put differently, the advantages of delaying the disclosure appeared to outweigh the risk that someone would reverse engineer the patches and rediscover certain attacks.
</p>

<h3>
	<a href="https://www.fragattacks.com/#apfragasfull" rel="external nofollow">Is the "Treating fragments as full frames" flaw (CVE-2020-26142) also applicable to APs?</a>
</h3>

<p>
	Yes, access points can also be vulnerable. In particular, during additional experiments that I recently performed, the vulnerability was also present in OpenBSD when it acted as an access point.
</p>

<h3>
	<a href="https://www.fragattacks.com/#aprecievebcast" rel="external nofollow">Can APs be vulnerable to attacks that send broadcast frames?</a>
</h3>

<p>
	Yes, although they are less likely to be vulnerable compared to clients. This is because under normal circumstances clients never send a frame to the AP with a broadcast receiver address. Instead, clients first send broadcast/multicast network packets as unicast Wi-Fi frames to the AP, and the AP then broadcasts these packets to all connected clients. As a result, many APs will simply ignore Wi-Fi frames with a broadcast receiver address, because in normal networks those frames are only meant for clients.
</p>

<h3>
	<a href="https://www.fragattacks.com/#whyold" rel="external nofollow">Why are some of the tested devices so old?</a>
</h3>

<p>
	I also tested some very old Wi-Fi devices and dongles to estimate how long the discovered vulnerabilities have been present in the wild. Note that some old devices may remain in use for a long time, for example, expensive medical or industrial equipment that is rarely replaced.
</p>

<h3>
	<a href="https://www.fragattacks.com/#forcebaddns" rel="external nofollow">How did you make macOS switch to the malicious DNS server in the demonstration?</a>
</h3>

<p>
	After injecting the ICMPv6 Router Advertisement with the malicious DNS server, macOS won't immediately use this DNS server. This is because macOS will only switch to the malicious DNS server if its current (primary) DNS server is no longer responding. To force this to happen, we briefly block all traffic towards the victim. This causes macOS to switch to the malicious DNS server.
</p>

<h3>
	<a href="https://www.fragattacks.com/#nyuhsts" rel="external nofollow">Isn't nyu.edu using HSTS to prevent these kind of attacks?</a>
</h3>

<p>
	Websites can use <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="external nofollow">HSTS</a> to force browsers to always use HTTPS encryption when visiting a website. This prevents the attack that was shown in our <a href="https://www.fragattacks.com/#href" rel="external nofollow">demo</a>. Unfortunately, the website of NYU at the time did not properly configure HSTS. More technically, some subdomains such as globalhome.nyu.edu do instruct the browser to use HSTS by including the following header in responses:
</p>

<div>
	<pre>
strict-transport-security: max-age=31536000 ; includeSubDomains</pre>
</div>

<p>
	Unfortunately, other subdomains such as shibboleth.nyu.edu remove HSTS by including the following header in responses:
</p>

<div>
	<pre>
Strict-Transport-Security: max-age=0</pre>
</div>

<p>
	Combined with other configuration decisions, this meant that when a user would type nyu.edu in their browser, the initial request was sent in plaintext and therefore could be intercepted by an adversary.
</p>

<p>
	Note that NYU has been informed of this issue and is investigating it.
</p>

<h3>
	<a href="https://www.fragattacks.com/#bluekeep" rel="external nofollow">How do I reproduce the BlueKeep attack shown in the demonstration?</a>
</h3>

<p>
	First, when using the NAT punching technique, it is essential that you manually configure the CPORT parameter so that metasploit uses the correct client port. You can learn this port from the injected TCP SYN packet that arrives at the server. When using a different client port the router/NAT will not recognize the connection and will not forward it to the victim machine.
</p>

<p>
	Second, you must set the AutoCheck parameter to zero. Otherwise metasploit will try to initiate multiple connections with the victim and that is problematic when manually specifying a client port through CPORT. This workaround of setting AutoCheck to zero can be avoided by punching multiple holes in the router/NAT and modifying the metasploit to use a different CPORT for each connection that will be initiated.
</p>

<p>
	 
</p>

<p>
	Sursa: <a href="https://www.fragattacks.com/" rel="external nofollow">https://www.fragattacks.com/</a>
</p>
]]></description><guid isPermaLink="false">114695</guid><pubDate>Tue, 11 May 2021 22:50:16 +0000</pubDate></item><item><title>Wifi hack?</title><link>https://rstforums.com/forum/topic/114692-wifi-hack/</link><description><![CDATA[<p>
	Am sa va spun un lucru curios:
</p>

<p>
	La mine in zona este o retea wifi la care, uneori, telefonul mi se conecta automat. Cum este posibil? Nu are acelasi nume cu propria mea retea wifi si vad ca are si parola pe care am aflat-o scanand acel QR code. De unde stia telefonul parola? Nu cunosc reteaua si nu am avut niciodata acces la ea ca sa poti sa zici ca mi-a dat cineva parola si am uitat eu acest lucru. Cum se explica toate astea?
</p>

<p>
	 
</p>

<p>
	Doi la mana, sa spunem ca ai acces la o retea wifi ca in cazul de fata, ce poti sa faci mai departe in afara de o folosi ca pe o retea wifi pur si simplu in loc sa o folosesti pe a ta?
</p>

<p>
	Cum poti vedea ce calculatoare sau telefoane si tablete sunt conectate?
</p>

<p>
	Si daca le vezi, poti avea acces la ele, nu ar fi acelasi lucru ca si la o oricare alta retea publica de pe la baruri sau cafenele?
</p>

<p>
	Multumesc anticipat!
</p>
]]></description><guid isPermaLink="false">114692</guid><pubDate>Sat, 08 May 2021 14:00:42 +0000</pubDate></item><item><title>krackattacks-scripts</title><link>https://rstforums.com/forum/topic/114311-krackattacks-scripts/</link><description><![CDATA[<p>
	This project contains scripts to test if clients or access points (APs) are affected by the KRACK attack against WPA2. For <a href="https://www.krackattacks.com/" rel="external nofollow">details behind this attack see our website</a> and <a href="https://papers.mathyvanhoef.com/ccs2017.pdf" rel="external nofollow">the research paper</a>.
</p>

<p>
	Remember that our scripts are not attack scripts! You will need the appropriate network credentials in order to test if an access point or client is affected by the KRACK attack.
</p>

<p>
	21 January 2021: the scripts have been made compatible with Python3 and has been updated to better support newer Linux distributions. If you want to revert to the old version, execute git fetch --tags &amp;&amp; git checkout v1 after cloning the repository (and switch back to the latest version using git checkout research).
</p>

<h1>
	Prerequisites
</h1>

<p>
	Our scripts were tested on Kali Linux. To install the required dependencies on Kali, execute:
</p>

<pre>
sudo apt update
sudo apt install libnl-3-dev libnl-genl-3-dev pkg-config libssl-dev net-tools git sysfsutils virtualenv
</pre>

<p>
	Then disable hardware encryption:
</p>

<pre>
cd krackattack
sudo ./disable-hwcrypto.sh
</pre>

<p>
	Note that if needed you can later re-enable hardware encryption using the script sudo ./reenable-hwcrypto.sh. It's recommended to reboot after disabling hardware encryption. We tested our scripts with an Intel Dual Band Wireless-AC 7260 and a TP-Link TL-WN722N v1 on Kali Linux.
</p>

<p>
	Now compile our modified hostapd instance:
</p>

<pre>
cd krackattack
./build.sh
</pre>

<p>
	Finally, to assure you're using compatible python libraries, create a virtualenv with the dependencies listed in krackattack/requirements.txt:
</p>

<pre>
cd krackattack
./pysetup.sh
</pre>

<h1>
	Before every usage
</h1>

<p>
	Every time before you use the scripts you must disable Wi-Fi in your network manager. Then execute:
</p>

<pre>
sudo rfkill unblock wifi
cd krackattack
sudo su
source venv/bin/activate
</pre>

<p>
	After doing this you can executing the scripts multiple times as long as you don't close the terminal.
</p>

<h1>
	Testing Clients
</h1>

<p>
	First modify hostapd/hostapd.conf and edit the line interface= to specify the Wi-Fi interface that will be used to execute the tests. Note that for all tests, once the script is running, you must let the device being tested connect to the SSID testnetwork using the password abcdefgh. You can change settings of the AP by modifying hostapd/hostapd.conf. In all tests the client must use DHCP to get an IP after connecting to the Wi-Fi network. This is because some tests only start after the client has requested an IP using DHCP!
</p>

<p>
	You should now run the following tests located in the krackattacks/ directory:
</p>

<ol>
	<li>
		<p>
			./krack-test-client.py --replay-broadcast. This tests whether the client acceps replayed broadcast frames. If the client accepts replayed broadcast frames, this must be patched first. If you do not patch the client, our script will not be able to determine if the group key is being reinstalled (because then the script will always say the group key is being reinstalled).
		</p>
	</li>
	<li>
		<p>
			./krack-test-client.py --group --gtkinit. This tests whether the client installs the group key in the group key handshake with the given receive sequence counter (RSC). See section 6.4 of our [follow-up research paper(<a href="https://papers.mathyvanhoef.com/ccs2018.pdf" rel="external nofollow">https://papers.mathyvanhoef.com/ccs2018.pdf</a>)] for the details behind this vulnerability.
		</p>
	</li>
	<li>
		<p>
			./krack-test-client.py --group. This tests whether the client reinstalls the group key in the group key handshake. In other words, it tests if the client is vulnerable to CVE-2017-13080. The script tests for reinstallations of the group key by sending broadcast ARP requests to the client using an already used (replayed) packet number (here packet number = nonce = IV). Note that if the client always accepts replayed broadcast frames (see --replay-broadcast), this test might incorrectly conclude the group key is being reinstalled.
		</p>
	</li>
	<li>
		<p>
			./krack-test-client.py. This tests for key reinstallations in the 4-way handshake by repeatedly sending encrypted message 3's to the client. In other words, this tests for CVE-2017-13077 (the vulnerability with the highest impact) and for CVE-2017-13078 . The script monitors traffic sent by the client to see if the pairwise key is being reinstalled. Note that this effectively performs two tests: whether the pairwise key is reinstalled, and whether the group key is reinstalled. Make sure the client requests an IP using DHCP for the group key reinstallation test to start. To assure the client is sending enough unicast frames, you can optionally ping the AP: ping 192.168.100.254.
		</p>
	</li>
	<li>
		<p>
			./krack-test-client.py --tptk. Identical to test 4, except that a forged message 1 is injected before sending the encrypted message 3. This variant of the test is important because some clients (e.g. wpa_supplicant v2.6) are only vulnerable to pairwise key reinstallations in the 4-way handshake when a forged message 1 is injected before sending a retransmitted message 3.
		</p>
	</li>
	<li>
		<p>
			./krack-test-client.py --tptk-rand. Same as the above test, except that the forged message 1 contains a random ANonce.
		</p>
	</li>
	<li>
		<p>
			./krack-test-client.py --gtkinit. This tests whether the client installs the group key in the 4-way handshake with the given receive sequence counter (RSC). The script will continously execute new 4-way handshakes to test this. Unfortunately, this test can be rather unreliable, because any missed handshake messages cause synchronization issues, making the test unreliable. You should only execute this test in environments with little background noise, and execute it several times.
		</p>
	</li>
</ol>

<p>
	Some additional remarks:
</p>

<ul>
	<li>
		<p>
			The most important test is ./krack-test-client, which tests for ordinary key reinstallations in the 4-way handshake.
		</p>
	</li>
	<li>
		<p>
			Perform these tests in a room with little interference. A high amount of packet loss will make this script less reliable!
		</p>
	</li>
	<li>
		<p>
			Optionally you can manually inspect network traffic to confirm the output of the script (some Wi-Fi NICs may interfere with our scripts):
		</p>

		<ul>
			<li>
				<p>
					Use an extra Wi-Fi NIC in monitor mode to conform that our script (the AP) sends out frames using the proper packet numbers (IVs). In particular, check whether replayed broadcast frames indeed are sent using an already used packet number (IV).
				</p>
			</li>
			<li>
				<p>
					Use an extra Wi-Fi NIC in monitor mode to check pairwise key reinstalls by monitoring the IVs of frames sent by the client.
				</p>
			</li>
			<li>
				<p>
					Capture traffic on the client to see if the replayed broadcast ARP requests are accepted or not.
				</p>
			</li>
		</ul>
	</li>
	<li>
		<p>
			If the client can use multiple Wi-Fi radios/NICs, perform the test using several Wi-Fi NICs.
		</p>
	</li>
	<li>
		<p>
			You can add the --debug parameter for more debugging output.
		</p>
	</li>
	<li>
		<p>
			All unrecognized parameters are passed on to hostapd, so you can include something like -dd -K to make hostapd output all debug info.
		</p>
	</li>
</ul>

<h2>
	Correspondence to Wi-Fi Alliance tests
</h2>

<p>
	The <a href="https://www.wi-fi.org/security-update-october-2017" rel="external nofollow">Wi-Fi Alliance created a custom vulnerability detection tool</a> based on our scripts. At the time of writing, this tool is only accessible to Wi-Fi Alliance members. Their tools supports several different tests, and these tests correspond to the functionality in our script as follows:
</p>

<ul>
	<li>
		<p>
			4.1.1 (Plaintext retransmission of EAPOL Message 3). We currently do not support this test. This test is not necessary anyway. Make sure the device being tested passes test 4.1.3, and then it will also pass this test.
		</p>
	</li>
	<li>
		<p>
			4.1.2 (Immediate retransmission of EAPOL M3 in plaintext). We currently do not suppor this test. Again, make sure the device being tested passes test 4.1.3, and then it will also pass this test.
		</p>
	</li>
	<li>
		<p>
			4.1.3 (Immediate retransmission of encrypted EAPOL M3 during pairwise rekey handshake). This corresponds to ./krack-test-client.py, except that encrypted EAPOL M3 are sent periodically instead of immediately.
		</p>
	</li>
	<li>
		<p>
			4.1.5 (PTK reinstallation in 4-way handshake when STA uses Temporal PTK construction, same ANonce). Execute this test using ./krack-test-client.py --tptk.
		</p>
	</li>
	<li>
		<p>
			4.1.6 (PTK reinstallation in 4-way handshake when STA uses Temporal PTK construction, random ANonce). Execute this test using ./krack-test-client.py --tptk-rand.
		</p>
	</li>
	<li>
		<p>
			4.2.1 (Group key handshake vulnerability test on STA). Execue this test using ./krack-test-client.py --group.
		</p>
	</li>
	<li>
		<p>
			4.3.1 (Reinstallation of GTK and IGTK on STA supporting WNM sleep mode). We currently do not support this test (and neither does the Wi-Fi Alliance actually!).
		</p>
	</li>
</ul>

<h1>
	Testing Access Points: Detecting a vulnerable FT Handshake (802.11r)
</h1>

<ol>
	<li>
		<p>
			Create a wpa_supplicant configuration file that can be used to connect to the network. A basic example is:
		</p>

		<pre>
 ctrl_interface=/var/run/wpa_supplicant
 network={
   ssid="testnet"
   key_mgmt=FT-PSK
   psk="password"
 }
</pre>

		<p>
			Note the use of "FT-PSK". Save it as network.conf or similar. For more info see <a href="https://w1.fi/cgit/hostap/plain/wpa_supplicant/wpa_supplicant.conf" rel="external nofollow">wpa_supplicant.conf</a>.
		</p>
	</li>
	<li>
		<p>
			Try to connect to the network using your platform's wpa_supplicant. This will likely require a command such as:
		</p>

		<pre>
 sudo wpa_supplicant -D nl80211 -i wlan0 -c network.conf
</pre>

		<p>
			If this fails, either the AP does not support FT, or you provided the wrong network configuration options in step 1. Note that if the AP does not support FT, it is not affected by this vulnerability.
		</p>
	</li>
	<li>
		<p>
			Use this script as a wrapper over the previous wpa_supplicant command:
		</p>

		<pre>
 sudo ./krack-ft-test.py wpa_supplicant -D nl80211 -i wlan0 -c network.conf
</pre>

		<p>
			This will execute the wpa_supplicant command using the provided parameters, and will add a virtual monitor interface that will perform attack tests.
		</p>
	</li>
	<li>
		<p>
			Use wpa_cli to roam to a different AP of the same network. For example:
		</p>

		<pre>
 sudo wpa_cli -i wlan0
 &gt; status
 bssid=c4:e9:84:db:fb:7b
 ssid=testnet
 ...
 &gt; scan_results 
 bssid / frequency / signal level / flags / ssid
 c4:e9:84:db:fb:7b	2412  -21  [WPA2-PSK+FT/PSK-CCMP][ESS] testnet
 c4:e9:84:1d:a5:bc	2412  -31  [WPA2-PSK+FT/PSK-CCMP][ESS] testnet
 ...
 &gt; roam c4:e9:84:1d:a5:bc
 ...
</pre>

		<p>
			In this example we were connected to AP c4:e9:84:db:fb:7b of testnet (see status command). The scan_results command shows this network also has a second AP with MAC c4:e9:84:1d:a5:bc. We then roam to this second AP.
		</p>
	</li>
	<li>
		<p>
			Generate traffic between the AP and client. For example:
		</p>

		<pre>
 sudo arping -I wlan0 192.168.1.10
</pre>
	</li>
	<li>
		<p>
			Now look at the output of ./krack-ft-test.py to see if the AP is vulnerable.
		</p>

		<ol>
			<li>
				First it should say "Detected FT reassociation frame". Then it will start replaying this frame to try the attack.
			</li>
			<li>
				The script shows which IVs (= packet numbers) the AP is using when sending data frames.
			</li>
			<li>
				Message IV reuse detected (IV=X, seq=Y). AP is vulnerable! means we confirmed it's vulnerable.
			</li>
		</ol>

		<p>
			Be sure to manually check network traces as well, to confirm this script is replaying the reassociation request properly, and to manually confirm whether there is IV (= packet number) reuse or not.
		</p>

		<p>
			Example output of vulnerable AP:
		</p>

		<pre>
 [15:59:24] Replaying Reassociation Request
 [15:59:25] AP transmitted data using IV=1 (seq=0)
 [15:59:25] Replaying Reassociation Request
 [15:59:26] AP transmitted data using IV=1 (seq=0)
 [15:59:26] IV reuse detected (IV=1, seq=0). AP is vulnerable!
</pre>

		<p>
			Example output of patched AP (note that IVs are never reused):
		</p>

		<pre>
 [16:00:49] Replaying Reassociation Request
 [16:00:49] AP transmitted data using IV=1 (seq=0)
 [16:00:50] AP transmitted data using IV=2 (seq=1)
 [16:00:50] Replaying Reassociation Request
 [16:00:51] AP transmitted data using IV=3 (seq=2)
 [16:00:51] Replaying Reassociation Request
 [16:00:52] AP transmitted data using IV=4 (seq=3)
</pre>
	</li>
</ol>

<h1>
	Extra: Hardware Decryption
</h1>

<p>
	To confirm that hardware decryption is disable, execute systool -vm ath9k_htc or similar after plugging in your Wi-Fi NIC to confirm the nohwcript/swcrypto/hwcrypto parameter has been set. Note that you must replace ath9k_htc with the kernel module for your wireless network card.
</p>

<h1>
	Extra: 5 GHz not supported
</h1>

<p>
	There's no official support for testing devices in the 5 GHz band.
</p>

<p>
	If you nevertheless want to use the tool on 5 GHz channels, the network card being used must allow the injection of frames in the 5 GHz channel. Unfortunately, this is not always possible due to regulatory constraints. To see on which channels you can inject frames you can execute iw list and look under Frequencies for channels that are not marked as disabled, no IR, or radar detection. Note that these conditions may depend on your network card, the current configured country, and the AP you are connected to. For more information see, for example, the <a href="https://wiki.archlinux.org/index.php/Network_configuration/Wireless#Respecting_the_regulatory_domain" rel="external nofollow">Arch Linux documentation</a>.
</p>

<p>
	Note that the Linux kernel may not allow the injection of frames even though it is allowed to send normal frames. This is because in the function ieee80211_monitor_start_xmit the kernel refuses to inject frames when cfg80211_reg_can_beacon returns false. As a result, Linux may refuse to inject frames even though this is actually allowed. Making cfg80211_reg_can_beacon return true under the correct (or all) conditions prevents this bug. So you'll have to patch the Linux drivers so that cfg80211_reg_can_beacon always returns true, for instance, by manually patching the <a href="https://backports.wiki.kernel.org/index.php/Main_Page" rel="external nofollow">packport driver</a> code.
</p>

<h1>
	Extra: Manual Tests
</h1>

<p>
	It's also possible to manually perform (more detailed) tests by cloning the hostap git repository:
</p>

<pre>
git clone git://w1.fi/srv/git/hostap.git
</pre>

<p>
	And following the instructions in <a href="https://w1.fi/cgit/hostap/tree/tests/cipher-and-key-mgmt-testing.txt" rel="external nofollow">tests/cipher-and-key-mgmt-testing.txt</a>.
</p>

<p>
	 
</p>

<p>
	Sursa: <a href="https://github.com/vanhoefm/krackattacks-scripts" rel="external nofollow">https://github.com/vanhoefm/krackattacks-scripts</a>
</p>
]]></description><guid isPermaLink="false">114311</guid><pubDate>Mon, 25 Jan 2021 00:10:33 +0000</pubDate></item><item><title>Wi-fi Cracking</title><link>https://rstforums.com/forum/topic/104211-wi-fi-cracking/</link><description><![CDATA[<p>
	Salutare tuturor, 
</p>

<p>
	 
</p>

<p>
	De curant m-am mutat intr-un oras nou si momentan nu am net unde sunt cazat dar am in jur multe retele wi-fi care sunt securizate asa ca am luat kali linux si inca un programel (pe care l-am rulat pe windows) si am aflat urmatoarele informatii:
</p>

<p>
	 
</p>

<p>
	In kali am pus placa de retea in monitor mode si am rulat airodump-ng -i wlan0mon pentru a obtine numele retelelor, ch-ul si alte info.
</p>

<p>
	Cu programul pentru windows am rulat o scanare si toate acele retele au pinul locked. Cu programe gen  <span style="color:rgb(191,191,191);font-family:Tahoma, sans-serif;font-size:13px;font-style:normal;font-weight:normal;letter-spacing:normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(28,28,28);float:none;">JumpStart</span>  nu functioneaza.
</p>

<p>
	Aseara am incercat un crack cu metoda clasica aka 1gb de password list dar nu am reusit nimica probabil din cauza ca parolele din lista respectiva erau in eng si nu ro.
</p>

<p>
	Am zis sa incerc cu pixie dar acolo primesc mesajul: detected ap rate limiting , waiting 60 seconds.
</p>

<p>
	 
</p>

<p>
	Ca echipament folosesc integrata dintr-un Asus X550L si mai am un adaptor extern edimax ac-600 dual band. Retelele sunt in mare parte de la upc printre care si cele gen: upc wi-free (nu am incercat cu acestea free deoarece nu cred ca pot fi "sparte") si mai sunt cateva de rds.
</p>

<p>
	 
</p>

<p>
	Orice ajutor/sfat/tutorial este bine venit . Multumesc anticipat !
</p>
]]></description><guid isPermaLink="false">104211</guid><pubDate>Tue, 10 Jan 2017 08:59:59 +0000</pubDate></item><item><title>Progran pentru Alpha AWUS036H</title><link>https://rstforums.com/forum/topic/114279-progran-pentru-alpha-awus036h/</link><description><![CDATA[<p>
	Salutare si scuze de topic nou.
</p>

<p>
	Am un adaptopr Alpha AWUS036H la care la un moment dat exista un "programel spart" de niste ukainieni si cu care puteam sparge unele retele de wifi.
</p>

<p>
	Programul era pe un cd ,care ulterior a fost pierdut. Chipul este RTL8187L si am scotocit mult pe net sa gasesc programul spart.
</p>

<p>
	Stie cineva daca pot face rost de programul spart? Acest adaptor a fost folosit de un marinar pentru a se putea conecta la retele wifi din diferite porturi.
</p>

<p>
	Va multumesc frumos si scuze de topic nou.
</p>
]]></description><guid isPermaLink="false">114279</guid><pubDate>Sat, 16 Jan 2021 05:19:32 +0000</pubDate></item><item><title>Stergere Icloud</title><link>https://rstforums.com/forum/topic/113545-stergere-icloud/</link><description><![CDATA[<p>
	Am un Iphone 7 si e blocat in Icloud.
</p>

<p>
	Dupa multe incercari am reusit sa il scot, dar nu pot baga contul meu nou Icloud si dupa restart il cere pe cel vechi.
</p>

<p>
	Ce pot sa fac?
</p>
]]></description><guid isPermaLink="false">113545</guid><pubDate>Tue, 18 Aug 2020 13:27:24 +0000</pubDate></item><item><title>Pass-the-hash WiFi</title><link>https://rstforums.com/forum/topic/113902-pass-the-hash-wifi/</link><description><![CDATA[<div>
		<div>
			<h1>
				Pass-the-hash WiFi
			</h1>

			<div>
				Reading time ~5 min
			</div>
			Posted by Michael Kruger on 02 October 2020

			<div>
				Categories: <a href="https://sensepost.com/blog/wifi/" rel="external nofollow">Wifi</a>
			</div>
		</div>
	</div>


<div>
	<p>
		Thanks to a <a href="https://twitter.com/dn3t/status/1312011085013225486" rel="external nofollow">tweet</a> Dominic responded to, I saw someone mention Passing-the-hash when I think they actually meant relay. The terminology can be confusing for sure, however, it made me realise that I had never Passed-the-hash with a Wi-Fi network.
	</p>

	<p>
		So having learnt my lesson from previous projects I first made sure this was possible for NT -&gt; MSCHAP by looking at the <a href="https://tools.ietf.org/html/rfc2759" rel="external nofollow">RFC</a>.
	</p>

	<pre>
8.1.  GenerateNTResponse()

   GenerateNTResponse(
   IN  16-octet              AuthenticatorChallenge,
   IN  16-octet              PeerChallenge,
   IN  0-to-256-char         UserName,

   IN  0-to-256-unicode-char Password,
   OUT 24-octet              Response )
   {
      8-octet  Challenge
      16-octet PasswordHash

      ChallengeHash( PeerChallenge, AuthenticatorChallenge, UserName,
                     giving Challenge)

      NtPasswordHash( Password, giving PasswordHash )
      ChallengeResponse( Challenge, PasswordHash, giving Response )
   }
</pre>

	<p>
		Looks like you can! As you can see in the above, the ChallengeResponse is created using the NT hash and not the password. I then checked wpa_supplicant to see if this was not a feature already, and it turns out it is! Looking at the wpa_supplicant configuration file it says:
	</p>

	<blockquote>
		<p>
			password: Password string for EAP. This field can include either the plaintext password (using ASCII or hex string) or a NtPasswordHash (16-byte MD4 hash of password) in hash:&lt;32 hex digits&gt; format. NtPasswordHash can only be used when the password is for MSCHAPv2 or MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). EAP-PSK (128-bit PSK), EAP-PAX (128-bit PSK), and EAP-SAKE (256-bit PSK) is also configured using this field. For EAP-GPSK, this is a variable length PSK. ext: format can be used to indicate that the password is stored in external storage.
		</p>
	</blockquote>

	<p>
		So to Pass-the-hash as a client when you use the password field in your wpa_supplicant.conf, just add a hash: in front and you can use that to authenticate.
	</p>

	<pre>
network={
        ssid="example"
        scan_ssid=1
        key_mgmt=WPA-EAP
        eap=PEAP
        identity="harold"
        password="hash:e19ccf75ee54e06b06a5907af13cef42"
        ca_cert="/etc/cert/ca.pem"
        phase1="peaplabel=0"
        phase2="auth=MSCHAPV2"
}
</pre>

	<p>
		This becomes useful when the machine account authenticates to the Wi-Fi rather than the user. This gives you the option of using the machine hash which would typically not be crackable.
	</p>

	<p>
		Now if you have compromised some hashes and they are using PEAP for their Wi-Fi you can connect easy peasy.
	</p>

	<h3>
		I am Corporate HotSpot
	</h3>

	<p>
		I also wondered if we could do the reverse. Lets say we have dumped the domains passwords and would like to trick people into connecting to our Wi-Fi so that we can provide them with free internet?
	</p>

	<div>
		
			<img alt="eviltwin-2.gif" src="https://sensepost.com/img/pages/blog/2020/pass-the-hash-wifi/eviltwin-2.gif" />
			
				Spock’s Evil Twin Passing-the-hash
			
		
	</div>

	<p>
		As a quick reminder why this is an interesting vector, the reason we would want to do this is due to the mutual authentication requirement for MSCHAP. While your device is authenticating against an AP, it also checks the response from the AP to ensure it knows the password as well. So if you are unable to prove you know the password, users will not connect unless their device is specifically ignoring the verification (as was the case for <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6203" rel="external nofollow">CVE-2019-</a><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6203" rel="external nofollow">6203</a>).
	</p>

	<p>
		Anyways, turns out you can do it from the other side as well as the AP only needs the NT hash as can be seen in the below pseudo code from the RFC:
	</p>

	<pre>
8.7.  GenerateAuthenticatorResponse()

   GenerateAuthenticatorResponse(
   IN  0-to-256-unicode-char Password,
   IN  24-octet              NT-Response,
   IN  16-octet              PeerChallenge,
   IN  16-octet              AuthenticatorChallenge,
   IN  0-to-256-char         UserName,
   OUT 42-octet              AuthenticatorResponse )
   {
      16-octet              PasswordHash
      16-octet              PasswordHashHash
      8-octet               Challenge

      /*
       * "Magic" constants used in response generation
       */

      Magic1[39] =
         {0x4D, 0x61, 0x67, 0x69, 0x63, 0x20, 0x73, 0x65, 0x72, 0x76,
          0x65, 0x72, 0x20, 0x74, 0x6F, 0x20, 0x63, 0x6C, 0x69, 0x65,
          0x6E, 0x74, 0x20, 0x73, 0x69, 0x67, 0x6E, 0x69, 0x6E, 0x67,
          0x20, 0x63, 0x6F, 0x6E, 0x73, 0x74, 0x61, 0x6E, 0x74};

      Magic2[41] =
         {0x50, 0x61, 0x64, 0x20, 0x74, 0x6F, 0x20, 0x6D, 0x61, 0x6B,
          0x65, 0x20, 0x69, 0x74, 0x20, 0x64, 0x6F, 0x20, 0x6D, 0x6F,
          0x72, 0x65, 0x20, 0x74, 0x68, 0x61, 0x6E, 0x20, 0x6F, 0x6E,
          0x65, 0x20, 0x69, 0x74, 0x65, 0x72, 0x61, 0x74, 0x69, 0x6F,
          0x6E};

      /*
       * Hash the password with MD4
       */

      NtPasswordHash( Password, giving PasswordHash )

      /*
       * Now hash the hash
       */

      HashNtPasswordHash( PasswordHash, giving PasswordHashHash)

      SHAInit(Context)
      SHAUpdate(Context, PasswordHashHash, 16)
      SHAUpdate(Context, NTResponse, 24)
      SHAUpdate(Context, Magic1, 39)
      SHAFinal(Context, Digest)

      ChallengeHash( PeerChallenge, AuthenticatorChallenge, UserName,
                     giving Challenge)

      SHAInit(Context)
      SHAUpdate(Context, Digest, 20)
      SHAUpdate(Context, Challenge, 8)
      SHAUpdate(Context, Magic2, 41)
      SHAFinal(Context, Digest)

      /*
       * Encode the value of 'Digest' as "S=" followed by
       * 40 ASCII hexadecimal digits and return it in
       * AuthenticatorResponse.
       * For example,
       *   "S=0123456789ABCDEF0123456789ABCDEF01234567"
       */

   }</pre>

	<p>
		Once again we just skip the part where we convert the password to an NT hash and just use the NT hash in the response generation. Hostapd supports this and the format looks like below:
	</p>

	<pre>
# Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users
"test user" MSCHAPV2 hash:000102030405060708090a0b0c0d0e0f [2]
</pre>

	<p>
		Now you have a hotspot that all domain users can connect to, and you may be able to trick user devices into fully connecting so you can give them all the Internet.
	</p>

	<p>
		 
	</p>

	<p>
		Sursa: <a href="https://sensepost.com/blog/2020/pass-the-hash-wifi/" rel="external nofollow">https://sensepost.com/blog/2020/pass-the-hash-wifi/</a>
	</p>
</div>
]]></description><guid isPermaLink="false">113902</guid><pubDate>Fri, 06 Nov 2020 15:32:25 +0000</pubDate></item><item><title>wireless adaptor</title><link>https://rstforums.com/forum/topic/110395-wireless-adaptor/</link><description><![CDATA[<p>
	Salut! Am vazut cateva post-uri pe aici despre asta dar n-am gasit nimic relevant de cumparat. Aveti idee ce adaptor as putea sa folosesc pentru kali la momentul de fata? Si posibil si un site de unde sa-l iau din Romania m-ar ajuta super mult. Tot ce am gasit eu nu s-a "pupat" la chipset cu ceea ce e recomandat pentru Kali, asa ca am zis decat sa dau banii degeaba pe ceva ce n-o sa folosesc, prefer sa pun o intrebare stupida:))
</p>]]></description><guid isPermaLink="false">110395</guid><pubDate>Fri, 22 Feb 2019 21:16:48 +0000</pubDate></item><item><title>Mikrotik setare BGP</title><link>https://rstforums.com/forum/topic/113043-mikrotik-setare-bgp/</link><description><![CDATA[<p>
	Salutare! Am o problema la setarea BGP pe un router Mikrotik (CCR1036) si nu reusesc sa ii dau de cap. Este cineva din priceput la configurarea BGP pe Mikrotik sa ma ajute cu aceasta problema? (contra-cost, bineinteles)
</p>
]]></description><guid isPermaLink="false">113043</guid><pubDate>Sun, 10 May 2020 07:44:22 +0000</pubDate></item><item><title>Adaptoare wireless bune pt Kali Linux in 2020??</title><link>https://rstforums.com/forum/topic/112871-adaptoare-wireless-bune-pt-kali-linux-in-2020/</link><description><![CDATA[<p>
	Buna! De ceva timp caut adaptoare pt Kali Linux (cea mai noua versiune, 2020) pt wireless pentesting. Sa pot sa dau enable la monitor mode, packet sniffing tot ce ar trebui sa faca un adaptor decent in zilele noastre. (nu am pretentie si la 5G neaparat). Stiu de celebrele adaptoare de la Alfa Networking doar ca in romania nu gasesti spre exemplu un  Alfa AWUS036NHA ,sau cam orice de la ei. 
</p>

<p>
	Am cumparat un tp-link tl-wn722n insa am aflat in cele din urma ca nu este V1 (nu s-a specificat nicaieri pe site-ul de unde l-am luat, primind un v3) asa ca urmeaza sa il returnez. Doresc sa evit sa comand de afara in perioada aceasta deci as dori niste adaptoare decente (mai de incepatori spre average useri) care sa nu coste mai mult de 150-170 (poate pana la 200 lei insa la asta ma mai gandesc. Puteti lasa recomandari pana in 200 , conteaza sa fie din romania). Pot achizitiona si un 2nd hand daca e neaparat insa as risca sa primesc un Alfa fake din cate am vazut.
</p>

<p>
	 
</p>

<p>
	Multumesc!!!
</p>
]]></description><guid isPermaLink="false">112871</guid><pubDate>Thu, 23 Apr 2020 14:07:30 +0000</pubDate></item><item><title>Exposing the WiFi Password Secrets</title><link>https://rstforums.com/forum/topic/112622-exposing-the-wifi-password-secrets/</link><description><![CDATA[<p>
	<strong>Introduction</strong>
</p>

<p>
	This research article throws light on the internal password storage and encryption mechanism used for storing the WiFi account passwords. It explains where the <strong>WiFi passwords</strong> are stored on different platforms and how to decrypt them using the practical code sample.
</p>

<p>
	 
</p>

<p style="text-align:center;">
	<img alt="wifi-password-secrets-mainscreen.jpg" class="ipsImage" data-ratio="62.44" height="281" width="450" src="https://securityxploded.com/images/wifi-password-secrets-mainscreen.jpg">
</p>

<p style="text-align:center;">
	 
</p>

<p>
	Note that it deals with WiFi settings stored by built-in Windows Wireless Configuration manager only. Also it covers only <strong>Vista and higher</strong> operating systems, though it may touch upon some aspects of Windows XP.
</p>

<p>
	 
</p>

<p>
	<strong>WiFi Configuration</strong>
</p>

<p>
	All Windows systems has built-in 'Wireless Configuration Manager' which helps in managing your Wireless connections
</p>

<p>
	Here are the simple steps involved in configuring your WiFi setup,
</p>

<ul>
	<li>
		From Control Panel, click on 'Network &amp; Internet'
	</li>
	<li>
		Next click on 'Network &amp; Sharing Center'. You will see all your network connections
	</li>
	<li>
		Now from the left panel click on 'Manage Wireless Networks'
	</li>
	<li>
		This will launch 'Wireless Configration' screen showing all your configured WiFi connections
	</li>
	<li>
		You can click on 'ADD' and then click on 'Manually Create Network Profile' to create new WiFi connections.
	</li>
</ul>

<p>
	Below is the screenshot showing the 'Add Wireless Network' dialog
</p>

<p>
	 
</p>

<p style="text-align:center;">
	<img alt="wifi-password-secrets-configuration.jpg" class="ipsImage" data-ratio="64.67" height="291" width="450" src="https://securityxploded.com/images/wifi-password-secrets-configuration.jpg">
</p>

<p>
	 
</p>

<p>
	<strong>WiFi Password Location</strong>
</p>

<p>
	Before we proceed, we need to know where these wireless settings are stored on the system. Depending on the platform, '<strong>Wireless Configuration Manager</strong>' uses different techniques and different storage locations to store these wireless settings.
</p>

<p>
	 
</p>

<p>
	<strong>For Windows XP/2003</strong>
</p>

<p>
	 
</p>

<p>
	On XP, all the Wireless settings are stored in Registry at following location,.
</p>

<pre class="ipsCode">
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces\{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}</pre>

<p>
	Here each wireless device/interface is represented by unique GUID {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} and all the settings for this device are stored under this GUID within the value 'ActiveSettings'. Actual contents are encrypted using '<strong>Windows Cryptography</strong>' functions [<a href="https://securityxploded.com/wifi-password-secrets.php#References" rel="external nofollow">Reference 1</a>].
</p>

<p>
	 
</p>

<p>
	<strong>For Vista, Windows 7, Windows 8 &amp; Windows 10</strong>
</p>

<p>
	 
</p>

<p>
	Vista onwards, 'Wireless Configuration Manager' no longer uses the registry. Instead all the wireless parameters including SSID, Authentication method &amp; encrypted Password are stored at following file,
</p>

<pre class="ipsCode">
C:\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}\{Random-GUID}.xml</pre>

<p>
	 
</p>

<p>
	Here each wireless device is represented by its interface GUID {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} and all the wireless settings for this device are stored in XML file with random GUID name.
</p>

<p>
	 
</p>

<p>
	<strong>WiFi Storage Mechanism</strong>
</p>

<p>
	All the information discussed hence forth will apply only to Vista and higher operating systems only.
</p>

<p>
	As we know already, each wireless settings are stored in <strong>XML file</strong>. Here is the actual contents of one such file,
</p>

<pre class="ipsCode prettyprint lang-xml prettyprinted">
<span class="pun">&lt;?</span><span class="pln">xml version</span><span class="pun">=</span><span class="str">"1.0"</span><span class="pun">?&gt;</span><span class="pln">
</span><span class="tag">&lt;WLANProfile</span><span class="pln"> </span><span class="atn">xmlns</span><span class="pun">=</span><span class="atv">"http://www.microsoft.com/networking/WLAN/profile/v1"</span><span class="tag">&gt;</span><span class="pln">
</span><span class="tag">&lt;name&gt;</span><span class="pln">SecurityXploded</span><span class="tag">&lt;/name&gt;</span><span class="pln">
</span><span class="tag">&lt;SSIDConfig&gt;</span><span class="pln">
</span><span class="tag">&lt;SSID&gt;</span><span class="pln">
</span><span class="tag">&lt;hex&gt;</span><span class="pln">536563757269747958706C6F646564</span><span class="tag">&lt;/hex&gt;</span><span class="pln">
</span><span class="tag">&lt;name&gt;</span><span class="pln">SecurityXploded</span><span class="tag">&lt;/name&gt;</span><span class="pln">
</span><span class="tag">&lt;/SSID&gt;</span><span class="pln">
</span><span class="tag">&lt;nonBroadcast&gt;</span><span class="pln">false</span><span class="tag">&lt;/nonBroadcast&gt;</span><span class="pln">
</span><span class="tag">&lt;/SSIDConfig&gt;</span><span class="pln">
</span><span class="tag">&lt;connectionType&gt;</span><span class="pln">ESS</span><span class="tag">&lt;/connectionType&gt;</span><span class="pln">
</span><span class="tag">&lt;connectionMode&gt;</span><span class="pln">auto</span><span class="tag">&lt;/connectionMode&gt;</span><span class="pln">
</span><span class="tag">&lt;autoSwitch&gt;</span><span class="pln">false</span><span class="tag">&lt;/autoSwitch&gt;</span><span class="pln">
</span><span class="tag">&lt;MSM&gt;</span><span class="pln">
</span><span class="tag">&lt;security&gt;</span><span class="pln">
</span><span class="tag">&lt;authEncryption&gt;</span><span class="pln">
</span><span class="tag">&lt;authentication&gt;</span><span class="pln">WPAPSK</span><span class="tag">&lt;/authentication&gt;</span><span class="pln">
</span><span class="tag">&lt;encryption&gt;</span><span class="pln">AES</span><span class="tag">&lt;/encryption&gt;</span><span class="pln">
</span><span class="tag">&lt;useOneX&gt;</span><span class="pln">false</span><span class="tag">&lt;/useOneX&gt;</span><span class="pln">
</span><span class="tag">&lt;/authEncryption&gt;</span><span class="pln">
</span><span class="tag">&lt;sharedKey&gt;</span><span class="pln">
</span><span class="tag">&lt;keyType&gt;</span><span class="pln">passPhrase</span><span class="tag">&lt;/keyType&gt;</span><span class="pln">
</span><span class="tag">&lt;protected&gt;</span><span class="pln">true</span><span class="tag">&lt;/protected&gt;</span><span class="pln">
</span><span class="tag">&lt;keyMaterial&gt;</span><span class="pln">01000000D08C9DDF0115D1118C7A00C0***TRUNCATED***DA88A2</span><span class="tag">&lt;/keyMaterial&gt;</span><span class="pln">
</span><span class="tag">&lt;/sharedKey&gt;</span><span class="pln">
</span><span class="tag">&lt;/security&gt;</span><span class="pln">
</span><span class="tag">&lt;/MSM&gt;</span><span class="pln">
</span><span class="tag">&lt;/WLANProfile&gt;</span></pre>

<p>
	 
</p>

<p>
	Each Wireless profile mainly stores information about WiFi name, security settings such as authentication, encryption and the encrypted password.
</p>

<p>
	 
</p>

<p>
	In the above example, WiFi Network name aka SSID is 'SecurityXploded' which is stored in both ASCII and HEX format. Next important things are authentication &amp; encryption which are stored within <strong>&lt;authEncryption&gt; node</strong>. This wireless configuration uses <strong>WPA (WPAPSK)</strong> for authentication and AES for encryption.
</p>

<p>
	 
</p>

<p>
	Now comes the most interesting thing, 'WiFi Password' which is stored under under <strong>&lt;sharedKey&gt;</strong> node. Here &lt;protected&gt; field indicates if the password is encrypted or stored in clear text. If the &lt;protected&gt; field is true that means password is encrypted and same can be found in <strong>&lt;keyMaterial&gt;</strong> node as in above example.
</p>

<p>
	 
</p>

<p>
	<strong>WiFi Password Encryption &amp; Decryption</strong>
</p>

<p>
	If you are one of us who live in Crypto world then it does not take much time to decipher the encryption method used here.
</p>

<p>
	 
</p>

<p>
	Clearly it uses '<strong>Windows Cryptography</strong>' functions [Reference 1] to encrypt &amp; decrypt the WiFi passwords. Here is the signature which is at the beginning of encrypted password.
</p>

<pre class="ipsCode">
01000000D08C9DDF0115D1118C7A00C0</pre>

<p>
	To be more precise, 'Wireless Configuration Manager' uses <strong>CryptProtectData</strong> to encrypt the Wireless keys &amp; passwords. Another notable thing is that it does not use any salt or magic key for encryption. This makes decryption simple and straightforward using <strong>CryptUnprotectData</strong> as shown in the example below.
</p>

<p>
	 
</p>

<pre class="ipsCode prettyprint lang-c prettyprinted">
<span class="com">//</span><span class="pln">
</span><span class="com">// Wireless Key/Password Decryption Algorithm for Vista/Windows 7/Windows 8/Windows 10</span><span class="pln">
</span><span class="com">//</span><span class="pln">
</span><span class="kwd">void</span><span class="pln"> </span><span class="typ">DecryptWiFiPassword</span><span class="pun">(</span><span class="pln">BYTE </span><span class="pun">*</span><span class="pln">buffer</span><span class="pun">,</span><span class="pln"> DWORD dwSizeBuffer</span><span class="pun">)</span><span class="pln">
</span><span class="pun">{</span><span class="pln">
	DATA_BLOB </span><span class="typ">DataIn</span><span class="pun">;</span><span class="pln">
	DATA_BLOB </span><span class="typ">DataOut</span><span class="pun">;</span><span class="pln">
	
 	</span><span class="typ">DataIn</span><span class="pun">.</span><span class="pln">pbData </span><span class="pun">=</span><span class="pln"> buffer</span><span class="pun">;</span><span class="pln">
	</span><span class="typ">DataIn</span><span class="pun">.</span><span class="pln">cbData </span><span class="pun">=</span><span class="pln"> dwSizeBuffer</span><span class="pun">;</span><span class="pln">
			
	</span><span class="kwd">if</span><span class="pun">(</span><span class="typ">CryptUnprotectData</span><span class="pun">(&amp;</span><span class="typ">DataIn</span><span class="pun">,</span><span class="pln"> </span><span class="lit">0</span><span class="pun">,</span><span class="pln"> NULL</span><span class="pun">,</span><span class="pln"> NULL</span><span class="pun">,</span><span class="pln">NULL</span><span class="pun">,</span><span class="lit">0</span><span class="pun">,&amp;</span><span class="typ">DataOut</span><span class="pun">))</span><span class="pln">
	</span><span class="pun">{</span><span class="pln">
		printf</span><span class="pun">(</span><span class="str">"\n Wireless Key Password : %s"</span><span class="pun">,</span><span class="pln"> </span><span class="pun">(</span><span class="kwd">char</span><span class="pln"> </span><span class="pun">*)</span><span class="pln"> </span><span class="typ">DataOut</span><span class="pun">.</span><span class="pln">pbData</span><span class="pun">);</span><span class="pln">

	</span><span class="pun">}</span><span class="pln">
 </span><span class="pun">}</span></pre>

<p>
	One catch here is that you can't just decrypt the password even though you are administrator. To successfully decrypt the password, you have to perform the decryption operation under system context.
</p>

<p>
	 
</p>

<p>
	There are many ways to execute the code under <strong>SYSTEM context</strong>, one of the popular way is to <strong>inject the code</strong> via remote thread [Reference 2] in system process - LSASS.EXE. But this one is more risky, as any flaw in code can bring down the entire system. Much safer way is to create Windows service as System account and then execute the above decryption code from that service.
</p>

<p>
	 
</p>

<p>
	<strong>Recover Wireless Passwords using WiFi Password Decryptor</strong>
</p>

<p>
	<a href="https://securityxploded.com/wifi-password-decryptor.php" rel="external nofollow">WiFi Password Decryptor</a> is the FREE tool to automatically detects &amp; decrypts Wireless passwords stored on your system.
</p>

<p>
	 
</p>

<p>
	It instantly recovers all the WiFi passwords and displays various security settings (<strong>WEP/WPA/AES/TKIP</strong> etc) along with password in clear text.
</p>

<p>
	 
</p>

<p style="text-align:center;">
	<img alt="wifipassworddecryptor_mainscreen.jpg" class="ipsImage" data-ratio="76.44" height="344" width="450" src="https://securityxploded.com/images/wifipassworddecryptor_mainscreen.jpg">
</p>

<p style="text-align:center;">
	 
</p>

<p>
	It works on both <strong>32 bit &amp; 64 bit</strong> platforms, starting from Vista to latest operating system, Windows 10.
</p>

<p>
	 
</p>

<p>
	<strong>References</strong>
</p>

<ol>
	<li>
		<a href="http://msdn.microsoft.com/en-us/library/aa380252(VS.85).aspx#data_encryption_and_decryption_functions" rel="external nofollow">Windows Cryptography Functions</a>
	</li>
	<li>
		<a href="http://securityxploded.com/ntcreatethreadex.php" rel="external nofollow">Remote Thread Execution in System Process using NtCreateThreadEx for Vista/Win7</a>
	</li>
</ol>

<p>
	 
</p>

<p>
	<a href="https://securityxploded.com/wifi-password-secrets.php" rel="external nofollow">Source</a>
</p>
]]></description><guid isPermaLink="false">112622</guid><pubDate>Wed, 01 Apr 2020 00:49:32 +0000</pubDate></item><item><title>r00kie-kr00kie. Exploring the kr00k attack</title><link>https://rstforums.com/forum/topic/112538-r00kie-kr00kie-exploring-the-kr00k-attack/</link><description><![CDATA[<div>
		<h1>
			r00kie-kr00kie. Exploring the kr00k attack
		</h1>
	</div>


<div>
	<ul>
		<li>
			<a href="https://hexway.io/research/r00kie-kr00kie/#description" rel="external nofollow">Description</a>
		</li>
		<li>
			<a href="https://hexway.io/research/r00kie-kr00kie/#process" rel="external nofollow">Process</a>
		</li>
	</ul>

	<div>
		<div>
			<p>
				<strong>TL;DR</strong>
			</p>

			<p>
				We created and published a PoC exploit of the <code>kr00k</code> attack (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15126" rel="external nofollow">CVE-2019-15126</a><span class="ipsEmoji">?</span> <a href="https://github.com/hexway/r00kie-kr00kie" rel="external nofollow">https://github.com/hexway/r00kie-kr00kie</a>
			</p>

			<p>
				All technical details can be found in the <a href="https://hexway.io/research/r00kie-kr00kie/#process" rel="external nofollow">Process</a> section.
			</p>

			<h1>
				INTRODUCTION AND MOTIVATION
			</h1>

			<p>
				In February 2020, ESET released the <a href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf" rel="external nofollow">KR00K - CVE-2019-15126 SERIOUS VULNERABILITY DEEP INSIDE YOUR WI-FI ENCRYPTION</a> research. The vulnerability works as follows:
			</p>

			<ol>
				<li>
					The victim connects to a WiFi hotspot
				</li>
				<li>
					The adversary sends disassociation requests to the client and, by doing so, disconnects the victim from the hotspot
				</li>
				<li>
					Wireless Network Interface Controllers (WNIC) WiFi chip of the client clears out a session key (Temporal Key) used for traffic decryption
				</li>
				<li>
					However, data packets, which can still remain in the buffer of the WiFi chip after the disassociation, <strong>will be encrypted with an all-zero encryption key and sent.</strong>
				</li>
				<li>
					The adversary intercepts all the packets sent by the victim after the disassociation and attempts to decrypt them using a known key value (which, as we remember, is set to zero)
				</li>
				<li>
					PROFIT
				</li>
			</ol>

			<p>
				<img data-ratio="55.02" alt="r00ki_description.png" src="https://hexway.io/wp-content/uploads/2020/03/r00ki_description.png">
			</p>

			<center>
				Figure 1. Not quite obvious, but if you look closely, then it’s a clear diagram that we took from ESET’s whitepaper
			</center>

			<p>
				 
			</p>

			<p>
				The following devices were claimed vulnerable:
			</p>

			<ul>
				<li>
					Amazon Echo 2nd gen
				</li>
				<li>
					Amazon Kindle 8th gen
				</li>
				<li>
					Apple iPad mini 2
				</li>
				<li>
					Apple iPhone 6, 6S, 8, XR
				</li>
				<li>
					Apple MacBook Air Retina 13-inch 2018
				</li>
				<li>
					Google Nexus 5
				</li>
				<li>
					Google Nexus 6
				</li>
				<li>
					Google Nexus 6P
				</li>
				<li>
					Raspberry Pi 3
				</li>
				<li>
					Samsung Galaxy S4 GT-I9505
				</li>
				<li>
					Samsung Galaxy S8
				</li>
				<li>
					Xiaomi Redmi 3S
				</li>
			</ul>

			<p>
				So, since we have <code>Raspberry Pi 3</code> ready at hand, let's find out whether <code>Kr00k</code> actually works. Surely, ESET researchers or some community members have already published a PoC, haven't they?
			</p>

			<p>
				<img data-ratio="35.48" alt="google2.gif" src="https://hexway.io/wp-content/uploads/2020/03/google2.gif">
			</p>

			<p>
				Umm, <a href="https://www.google.com/search?q=kr00k%20exploit" rel="external nofollow">Google</a> found nothing but a pile of FUDs and an empty <a href="https://github.com/search?q=kr00k" rel="external nofollow">GitHub</a> repository.
			</p>

			<p>
				Ok, let's make it ourselves.
			</p>

			<p>
				<strong>UPDATE</strong>: while we were drawing the logo for this publication, Thice Security posted a <a href="https://www.thice.nl/playing-with-kr00k/" rel="external nofollow">PoC</a> as well.
			</p>

			<h2>
				RESULTS
			</h2>

			<p>
				The <code>kr00k</code> attack is quite straightforward. So, it didn't take much time for us to write our PoC.
			</p>

			<p>
				To check whether a device is vulnerable, it'll suffice to run the <a href="https://github.com/hexway/r00kie-kr00kie/blob/master/r00kie-kr00kie.py" rel="external nofollow">r00kie-kr00kie.py</a> python script with <em>bssid</em>, <em>channel number</em>, and <em>the victim's mac address</em> used as parameters and to have a bit of patience.
			</p>

			<pre>
<code>-&gt;~:python3 r00kie-kr00kie.py -i wlan0 -b D4:38:9C:82:23:7A -c 88:C9:D0:FB:88:D1 -l 11</code></pre>

			<h2>
				DETAILS
			</h2>

			<p>
				After testing this PoC on different devices, we found out that the data of the clients that generated plenty of UDP traffic was the easiest to intercept. Among those clients, for example, there are various streaming apps because this kind of traffic (unlike small TCP packets) will always be kept in the buffer of a WiFi chip.
			</p>

			<p>
				BTW, here is another couple of devices we've used to prove the attack does work:
			</p>

			<ul>
				<li>
					Sony Xperia Z3 Compact (D5803)
				</li>
				<li>
					Huawei Honor 4X
				</li>
			</ul>

			<p>
				All in all, now you have another tool you can use during one of your <a href="https://hexway.io/service/red-team/" rel="external nofollow">Red Team</a> projects or security assessments of your clients' WiFi networks: <a href="https://github.com/hexway/r00kie-kr00kie" rel="external nofollow">https://github.com/hexway/r00kie-kr00kie</a>
			</p>

			<p>
				Do not forget to have a look at the <a href="https://hexway.io/research/r00kie-kr00kie/#process" rel="external nofollow">Process</a> section. There you'll find more details about this PoC development and the way it works.
			</p>

			<p>
				<strong>You are welcome!</strong>
			</p>

			<p>
				 
			</p>

			<p>
				<strong>Sursa: </strong><a href="https://hexway.io/research/r00kie-kr00kie/" rel="external nofollow">https://hexway.io/research/r00kie-kr00kie/</a>
			</p>
		</div>
	</div>
</div>
]]></description><guid isPermaLink="false">112538</guid><pubDate>Sun, 22 Mar 2020 00:34:27 +0000</pubDate></item></channel></rss>
