Kali Linux is one of the best Linux Distribution for security researchers and hobbyists. It packs all the necessary tools advanced network, software and hardware level security testing.
In my previous post, I explained about the Test for KRACK attack on Access Points that support FT by Security researcher Vanhoefm. According to a blog post in Kali Linux website, this script can create false positive results due to “benign retransmissions of data frames”.
KISMET
It is one of WiFi network security testing tools that can detect, sniff and act as a powerful IDS that can detect anomalies in network data packets. It can work with any wireless interface that supports monitor mode and can play with packets of 802.11 a,b,g,n WiFi standards.
It seems like that there is a way to check for KRACK Vulnerability in an access point using KISMET. The git-master KISMET detect any anomaly in data packets when a KRACK style attack is performed.
Hot to Install
First update and upgrade your OS by executing[AdSense-C]
apt update -y && apt upgrade -y
Install all the dependancies
apt install build-essential libmicrohttpd-dev libnl-3-dev libnl-genl-3-dev libcap-dev libpcap-dev libncurses5-dev libnm-dev libdw-dev libsqlite3-dev
Then download kismet from the below link
[AdSense-A]
Now go inside the directory
cd kismet
Then execute the following commands one by one.
./configure
make
make suidinstall
/usr/local/bin/kismet_capture_tools/kismet_cap_linux_wifi –list
kismet -c wlan0
Now open up a browser and enter localhost:2501 in the URL bar. If everything is done correctly, you should be able to get the console page. Here you will get all the information about interfaces and alerts from the server machine.
There is a chance of false positive results due to the packets de duplication technique that is employed by it. More over, it can miss the handshake due to its channel hopping mechanism. For more information, you can visit the original source link provided below.
Source : https://www.kali.org/news/kali-on-krack/
Rate the Project
Did you find this page useful? Help us to improve by rating this page.