A tool to test Wi-Fi clients and access points for fragmentation and aggregation vulnerabilities affecting all protected Wi-Fi networks.
FragAttacks is a security testing tool designed to discover fragmentation and aggregation vulnerabilities in Wi-Fi implementations. It simulates attacks that exploit flaws in how Wi-Fi devices handle frame fragmentation and aggregation, affecting all protected networks including WPA2 and WPA3. The tool helps identify security weaknesses that could allow packet injection or other malicious activities.
Security researchers, penetration testers, and network administrators who need to assess the vulnerability of Wi-Fi clients and access points to fragmentation and aggregation attacks. It is also suitable for developers working on Wi-Fi driver or firmware security.
FragAttacks provides a comprehensive, open-source testing suite for Wi-Fi vulnerabilities that are not covered by standard security tools. It offers detailed test commands for specific attack vectors, supports multiple network cards and testing modes, and includes patched drivers for accurate vulnerability detection.
FragAttacks is a security testing tool that identifies vulnerabilities in Wi-Fi implementations related to frame fragmentation and aggregation. It can test both clients and access points for a range of flaws that impact WPA2 and WPA3 networks, helping security researchers and network administrators assess the security of their Wi-Fi devices.
FragAttacks aims to provide a rigorous, open-source tool for uncovering fundamental Wi-Fi security flaws, emphasizing practical testing over theoretical analysis to help secure real-world networks.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Tests for a wide range of CVEs (e.g., CVE-2020-24586 to CVE-2020-26147) related to fragmentation and aggregation, with detailed commands for each attack vector as outlined in the README's test suite.
Supports mixed mode (single card with patched drivers), injection mode (two cards), and experimental hwsim mode, allowing adaptation to different hardware setups and testing scenarios.
Includes extensive documentation, research papers, presentation slides, and example packet captures, providing deep insights into the vulnerabilities and how to exploit them.
Provides patched Linux drivers and firmware for compatible network cards (e.g., TP-Link TL-WN722N v1.x, Intel AC 8265) to ensure accurate frame injection and testing reliability.
Only supports a short list of specific network cards, with some requiring patched drivers or firmware, and USB devices may be less reliable in virtual machines, as admitted in the README.
Requires installing specific kernel versions (e.g., 5.8 on Ubuntu 20.04), dependencies, patched drivers, and configuring virtual environments, which is time-consuming and error-prone.
Explicitly states support only for kernel versions up to 5.12, making it incompatible with newer Linux distributions without downgrading or manual adjustments.
Involves numerous commands, parameters, and troubleshooting steps (e.g., handling sleep modes, injection tests), demanding deep knowledge of Wi-Fi protocols and Linux networking.