Scripts to test if Wi-Fi clients or access points are vulnerable to the KRACK attack against WPA2.
krackattacks-scripts is a collection of Python scripts designed to test whether Wi-Fi clients or access points are vulnerable to the KRACK (Key Reinstallation Attack) against WPA2. It simulates specific attack vectors to detect key reinstallation flaws, helping identify unpatched devices. The scripts correspond to known CVEs and provide a methodical way to validate security patches.
Security researchers, penetration testers, network administrators, and Wi-Fi device manufacturers who need to verify if their systems are patched against KRACK vulnerabilities.
It offers a free, open-source alternative to proprietary testing tools, with detailed test cases mapped to Wi-Fi Alliance standards and support for both client and access point testing in controlled environments.
This project provides a suite of Python scripts to detect vulnerabilities related to the KRACK (Key Reinstallation Attack) against WPA2 Wi-Fi security. It allows security researchers and network administrators to test whether specific clients or access points are affected by critical CVEs like CVE-2017-13077 and CVE-2017-13080.
The project emphasizes responsible security testing by providing tools to verify patches and assess real-world vulnerability status, rather than functioning as attack scripts. It requires legitimate network credentials to operate.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Developed by the original KRACK researchers, ensuring tests accurately simulate attack vectors as per the official papers and Wi-Fi Alliance standards.
Tests for seven client vulnerabilities including critical CVEs like CVE-2017-13077 and CVE-2017-13080, plus AP testing for FT handshake flaws, covering key KRACK threats.
Includes guidance for using extra monitoring interfaces to manually confirm script findings, reducing false positives and increasing reliability in noisy environments.
Corresponds to Wi-Fi Alliance test cases, making it suitable for compliance testing and validation against industry security standards.
Requires Kali Linux, disabling hardware encryption with specific scripts, compatible Wi-Fi cards like Intel AC 7260, and a multi-step build process that can break on newer distributions.
No official support for 5 GHz testing, and success depends on driver adjustments and regulatory patches, as admitted in the 'Extra: 5 GHz not supported' section.
Assumes expertise in Linux command-line tools, Wi-Fi protocols, and network debugging, with minimal troubleshooting help or error handling in the scripts.