README: Reference Python MC-MitM implementation

This commit is contained in:
vanhoefm 2022-05-08 03:08:30 +02:00 committed by GitHub
parent 4a58319c84
commit f7ba3b4db4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -115,6 +115,8 @@ root@ubuntu:~$ echo 1 > diag_corrupt_fcs
#### Channel MitM and TKIP Broadcast Attack
**Update:** if you want to prototype multi-channel MitM attacks, consider using the [Python implementation](https://github.com/vanhoefm/mc-mitm) instead. It is based on Python/Scapy and easier to modify, at the cost of being slower when processing a lot of data.
This is an advanced attack and not for the fainthearted. It clones an existing Access Point on a different channel. This allows us to reliably manipulate encrypted traffic. We used this to break TKIP. See [our paper]() for details. An example on how we used it to verify that our awesome-sauce attacks work:
```bash