Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2023
DOI: 10.1145/3558482.3581779
|View full text |Cite
|
Sign up to set email alerts
|

Testing and Improving the Correctness of Wi-Fi Frame Injection

Abstract: Investigating the security of Wi-Fi devices often requires writing scripts that send unexpected or malformed frames, to subsequently monitor how the devices respond. Such tests generally use Linux and off-the-self Wi-Fi dongles. Typically, the dongle is put into monitor mode to get access to the raw content of received Wi-Fi frames and to inject, i.e., transmit, customized frames.In this paper, we demonstrate that monitor mode on Linux may, unbeknownst to the user, mistakenly inject Wi-Fi frames or even drop s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…In addition, the attacker can transmit CSAs by forging a CSA information element inside beacon frames, probe response frames, or action frames. Some prominent examples of MC-MitM-IV attacks, including KRACK, DoS, and the latest FragAttacks, have appeared in the literature [7], [9], [12], [30]. In Section III of our previous paper [13], we thoroughly explained the technical setup, inner workings, and extensive evaluation of various MC-MitM attacks that manipulate victim's data frames, resulting in frame decryption and potential extraction of sensitive data.…”
Section: ) Improved Variantmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the attacker can transmit CSAs by forging a CSA information element inside beacon frames, probe response frames, or action frames. Some prominent examples of MC-MitM-IV attacks, including KRACK, DoS, and the latest FragAttacks, have appeared in the literature [7], [9], [12], [30]. In Section III of our previous paper [13], we thoroughly explained the technical setup, inner workings, and extensive evaluation of various MC-MitM attacks that manipulate victim's data frames, resulting in frame decryption and potential extraction of sensitive data.…”
Section: ) Improved Variantmentioning
confidence: 99%
“…Regarding the MC-MitM improved variants, the most significant attacks include FragAttacks and some extended versions of KRACK attacks. The FragAttack is the latest non-vendor-specific attack using the MC-MitM position (discovered by Vanhoef in May 2021 [9]). It exploits a set of authentication weaknesses in the fragmentation and aggregation features of IEEE 802.11 standards allowing the attackers to inject packets into encrypted Wi-Fi networks and obtain sensitive client data.…”
mentioning
confidence: 99%