Jump to content

KRACK: Bypassing WPA2


cheeto

Recommended Posts

 

44 minutes ago, Sebkinne said:

Currently working on a PoC - we'll see how well it works. 

This would be very very cool, quite excited about this  one. It seems perfect for the pineapples if it works and it they can handle it.

Will test on a few (old) routers and phones once ready :)

Link to comment
Share on other sites

On 16.10.2017 at 3:54 PM, cheeto said:

RIGHT ON SEB!!!!!

This will be ground breaking!

If not possible in the Nano, maybe a newer version of the Wifi Pineapple?  :)

Cheers!

I don't see why it shouldn't work on the nano, the wpa_supplicant-attack doesn't seem computationally heavy or anything

Link to comment
Share on other sites

6 hours ago, sundhaug92 said:

Here's the code the original author used https://github.com/vanhoefm/krackattacks-test-ap-ft

Its a script to test for the vuln not the attack script "Remember that this is not an attack script!" & "we are already releasing this code because the script got leaked"

Link to comment
Share on other sites

1 hour ago, Sleezybax said:

Does anyone had any luck getting this running on the nano?

So far on my Tetra i get the Access point test python script to run partially but then stalls. It associates and authenticates but then hangs without error.

Runs well on Kali with network-manager stopped.

Link to comment
Share on other sites

  • 3 weeks later...
  • 1 month later...
  • 2 weeks later...
  • 3 weeks later...
  • 2 years later...

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...