Replies: 9 comments
-
That will not work as expected. Because all responses depend on AKM and Cypher suite. Even if you set OPN beacon params to announce such type of NETWORK, hcxdumptool will send this Beacon, but that's all. It does not respond to the following requests of the CLIENT, because Open Network attacks are unsupported and there is no underlying code to perform a protocol attack. |
Beta Was this translation helpful? Give feedback.
-
But client will send Auth and Assoc request for OPN network. The |
Beta Was this translation helpful? Give feedback.
-
No, hcxdumptool only accept AKM: PSK or PSKSHA256 the same applies to REASSOCIATION REQUESTS |
Beta Was this translation helpful? Give feedback.
-
hcxpcapngtool is able to detect, show and convert this information, because we're offline and have all the time of thee world to dive deeper into the protocol (some examples below):
or
or
Doing this on the fly by hcxdumptool the situation is different. We have to stay a "relative" long time on the channel and have to evaluate the protocol (read header, identify protocol, create response using the same protocol). That will slow us down and take a lot of CPU cycles. |
Beta Was this translation helpful? Give feedback.
-
But anyway, this discussion lead me to add detection of RADIUS AUTHENTICATION via UDP port 1812 to hcxpcapngtool.
|
Beta Was this translation helpful? Give feedback.
-
Pushed some improvements to hcxpcapngtool:
Now we got detailed information. Please take a look at the changes of the code and you'll see that we have left the MAC layer, entered IPv4 protocol, followed by UDP protocol to retrieve finally the information from RADIUS protocol. |
Beta Was this translation helpful? Give feedback.
-
I took a closer look at eaphammer and noticed that it is running a modified hostapd in background to perform the protocol attacks: |
Beta Was this translation helpful? Give feedback.
-
Here is a good explanation about eaphammer"Known Beacon Attack" attack mode: As previously assumed, eaphammer use hostapd to setup a full ASSECC POINT via hostapd, where hostapdt is an user space daemon for access point and authentication servers. To perform such kind of an attack we have to stay a (relative) long time on the channel The EAPOL key time out (e.g. to retrieve a M2) is much lower: The price tag to setup an entire ACCESS POINT to perform this attacks (performed by tools like eaphammer) is a way too high for me. |
Beta Was this translation helpful? Give feedback.
-
Some background information about WiFi layers: hcxdumptool lives in layers 1 (modified firmware mandatory) and 2 (monitor mode and packet injection by driver mandatory) only. More information about the types is here: |
Beta Was this translation helpful? Give feedback.
-
How can I use
--essidlist
with--beaconparams
for announcing OPN network?Beta Was this translation helpful? Give feedback.
All reactions