Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

About the SAE Exchange Protocol Fuzz Testing Issue #4

Open
D2y6p opened this issue Dec 18, 2023 · 2 comments
Open

About the SAE Exchange Protocol Fuzz Testing Issue #4

D2y6p opened this issue Dec 18, 2023 · 2 comments

Comments

@D2y6p
Copy link

D2y6p commented Dec 18, 2023

Hello, I have encountered an issue while using WPAxFuzz. When I select 'fuzz SAE Exchange,' WPAxFuzz gets stuck at 'Performing a SAE exchange:' and doesn't proceed further. I traced the problem to the generate_Scalar_Finite function, where the handshake function is being repeatedly called within a loop. What could be causing this issue, and I look forward to your response.

@efchatz
Copy link
Owner

efchatz commented Dec 18, 2023

Hello, can you let me know which Python version you are using, because I will have to check it?

In the meantime, if you want to check this module, you can use this repo: https://github.com/efchatz/easy-exploits/tree/main/Wi-Fi%20(WPA3-SAE), which is a simpler version of the fuzzer for SAE frames. Basically, the fuzzer uses these cases in a more generic way. Another way to check for SAE frame issues is to use the Authentication frame of the Management frames. Some more generic parameters are being tested from Auth module of the fuzzer, like the status code.

@D2y6p
Copy link
Author

D2y6p commented Dec 21, 2023

I apologize for not responding promptly. I am using Python 3.8.10, and thank you for this repo; it may be helpful. At the same time, I also hope to use WPAxFuzz. Below is my config.json, and I have already set two WNICs to monitor mode.

{
"AP_info":{
"AP_MAC_ADDRESS":"Filled",
"AP_SSID":"Filled",
"AP_CHANNEL":"Filled",
"AP_MAC_DIFFERENT_FREQUENCY":"not",
"CHANNEL_DIFFERENT_FREQUENCY":"not",
"PASSWORD":"Filled"
},
"STA_info":{
"TARGETED_STA_MAC_ADDRESS":"Filled"
},
"ATT_interface_info":{
"ATTACKING_INTERFACE":"Filled",
"MONITORING_INTERFACE":"Filled"
}
}

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants