Added beacon packet to handshake cap file for PMKID assoc attack

This commit is contained in:
root 2019-08-04 19:44:09 +02:00
commit 5302f7f3f3
2 changed files with 13 additions and 0 deletions

View file

@ -67,6 +67,9 @@ func (mod *WiFiModule) discoverAccessPoints(radiotap *layers.RadioTap, dot11 *la
}
if ap, isNew := mod.Session.WiFi.AddIfNew(ssid, bssid, frequency, radiotap.DBMAntennaSignal); !isNew {
//set beacon packet on the access point station.
//This is for it to be included in the saved handshake file for wifi.assoc
ap.Station.Handshake.Beacon = packet
ap.EachClient(func(mac string, station *network.Station) {
station.Handshake.SetBeacon(packet)
})

View file

@ -54,6 +54,16 @@ func (mod *WiFiModule) discoverHandshakes(radiotap *layers.RadioTap, dot11 *laye
staMac,
PMKID,
key.Nonce)
//add the ap's station's beacon packet to be saved as part of the handshake cap file
//https://github.com/ZerBea/hcxtools/issues/92
//https://github.com/bettercap/bettercap/issues/592
if ap.Station.Handshake.Beacon != nil {
mod.Debug("adding beacon frame to handshake for %s", apMac)
station.Handshake.AddFrame(1, ap.Station.Handshake.Beacon)
}
} else if !key.Install && !key.KeyACK && key.KeyMIC && !allZeros(key.Nonce) {
// [2] (MIC) client is sending SNonce+MIC to the API
station.Handshake.AddFrame(1, packet)