krackattacks-scripts | project contains scripts to test if clients or access points
kandi X-RAY | krackattacks-scripts Summary
kandi X-RAY | krackattacks-scripts Summary
krackattacks-scripts is a C library. krackattacks-scripts has no bugs, it has no vulnerabilities and it has medium support. However krackattacks-scripts has a Non-SPDX License. You can download it from GitHub.
This project contains scripts to test if clients or access points (APs) are affected by the KRACK attack against WPA2. For details behind this attack see our website and the research paper. Remember that our scripts are not attack scripts! You will need the appropriate network credentials in order to test if an access point or client is affected by the KRACK attack. 21 January 2021: the scripts have been made compatible with Python3 and has been updated to better support newer Linux distributions. If you want to revert to the old version, execute git fetch --tags && git checkout v1 after cloning the repository (and switch back to the latest version using git checkout research).
This project contains scripts to test if clients or access points (APs) are affected by the KRACK attack against WPA2. For details behind this attack see our website and the research paper. Remember that our scripts are not attack scripts! You will need the appropriate network credentials in order to test if an access point or client is affected by the KRACK attack. 21 January 2021: the scripts have been made compatible with Python3 and has been updated to better support newer Linux distributions. If you want to revert to the old version, execute git fetch --tags && git checkout v1 after cloning the repository (and switch back to the latest version using git checkout research).
Support
Quality
Security
License
Reuse
Support
krackattacks-scripts has a medium active ecosystem.
It has 3217 star(s) with 781 fork(s). There are 224 watchers for this library.
It had no major release in the last 12 months.
There are 3 open issues and 89 have been closed. On average issues are closed in 362 days. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of krackattacks-scripts is v1
Quality
krackattacks-scripts has 0 bugs and 0 code smells.
Security
krackattacks-scripts has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
krackattacks-scripts code analysis shows 0 unresolved vulnerabilities.
There are 0 security hotspots that need review.
License
krackattacks-scripts has a Non-SPDX License.
Non-SPDX licenses can be open source with a non SPDX compliant license, or non open source licenses, and you need to review them closely before use.
Reuse
krackattacks-scripts releases are available to install and integrate.
Installation instructions are not available. Examples and code snippets are available.
It has 96498 lines of code, 4665 functions and 173 files.
It has high code complexity. Code complexity directly impacts maintainability of the code.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of krackattacks-scripts
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of krackattacks-scripts
krackattacks-scripts Key Features
No Key Features are available at this moment for krackattacks-scripts.
krackattacks-scripts Examples and Code Snippets
No Code Snippets are available at this moment for krackattacks-scripts.
Community Discussions
No Community Discussions are available at this moment for krackattacks-scripts.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install krackattacks-scripts
You can download it from GitHub.
Support
There's no official support for testing devices in the 5 GHz band. If you nevertheless want to use the tool on 5 GHz channels, the network card being used must allow the injection of frames in the 5 GHz channel. Unfortunately, this is not always possible due to regulatory constraints. To see on which channels you can inject frames you can execute iw list and look under Frequencies for channels that are not marked as disabled, no IR, or radar detection. Note that these conditions may depend on your network card, the current configured country, and the AP you are connected to. For more information see, for example, the Arch Linux documentation. Note that the Linux kernel may not allow the injection of frames even though it is allowed to send normal frames. This is because in the function ieee80211_monitor_start_xmit the kernel refuses to inject frames when cfg80211_reg_can_beacon returns false. As a result, Linux may refuse to inject frames even though this is actually allowed. Making cfg80211_reg_can_beacon return true under the correct (or all) conditions prevents this bug. So you'll have to patch the Linux drivers so that cfg80211_reg_can_beacon always returns true, for instance, by manually patching the packport driver code.
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page