-
Notifications
You must be signed in to change notification settings - Fork 313
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSL3 unsupported protocol error - from specific client #139
Comments
We've located some very old phones to test. Same issue with Android 6 and IOS 9 clients. :( Is there an option we're missing to enable the support for older/insecure ssl maybe? |
Add IOS 10 to the list that generate the SSL error as well. Am I missing a step in my setup to enable the backwards compatibility with legacy devices? |
I just got my hands on a Windows 7 box to test. Same SSL error there too. :( |
Anyone? Is this user error or something else? Thanks! |
I'm seeing this also. I have a windows 10 target using AnyConnect to control it's wifi. Operating from a kali install. wlan0: STA 20:79:18:ee:5a:cf IEEE 802.11: authenticated Maybe this has something to do with openssl and supported TLS versions? UPDATE: OK, I see eaphammer has it's own openssl (1.1.1a). wondering if we can change up the openssl config? UPDATE: I built eaphammer with Openssl 1.0.0, same error |
I saw that and tried configuring eaphammer to use a couple of older 1.0.1 versions, but didn't see a difference. It was a while ago, but I can see if I took notes on which specific versions I tried. EDIT: Also thank you for responding! Glad to hear it's not just me. :) |
Okay so apparently I didn't save my notes when I rebuilt my Pi. :( I know I tried some 1.0.1 versions though but probably only the most recent versions. If you want to test different openssl versions - the kali-setup script looks at ~/eaphammer/settings/core/eaphammer.ini to set the download URLs for openssl, dictionaries,etc. Just change the versions and links in there and re-run ./kali-setup and it will compile whatever version of openssl that file points to. :) Edit to add: I just tested 1.0.1k and 1.0.1a and same error in both. I thought I read somewhere that the newest openssl versions don't allow sslv2 or sslv3 anymore so that's why I tried older versions. :) |
@jeepjungle bummer, it seemed like a good idea! Hopefully @s0lst1c3 will have better suggestions? |
I'm also experiencing this issue with the latest release (v1.13.0). Seems like a pretty serious issue if it's affecting Windows 7 and 10 clients. Any updates from the eaphammer team? wlan1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 |
Describe the bug
EDIT - I originally thought this was isolated to the Arduino ESP devices as clients, but I've confirmed the problem with Windows 7, iOS 9 and 10, and Android 6 clients as well. Just adding the edit to the top of the report. I've also replied to this thread as I tested other legacy clients and experienced the same issue.. :(
I'm setting up a test lab, and trying to use Arduino ESP8266WiFi devices as test clients. They successfully connect to an actual EAP-PEAP and/or EAP-TTLS network with RADIUS authentication. In eaphammer I get the exact error from this past (fixed) bug report: #48
However, when we attack these clients specifically on the test network with eaphammer, the clients generate this in eaphammer:
All other client types (phones, laptops, etc.) behave as expected when attacked and we are able to collect hashes and/or GTC downgrade cleartext creds.
To Reproduce
We configured the ESP8266WiFi devices per section 3.14 of the API here: https://www.espressif.com/sites/default/files/documentation/2c-esp8266_non_os_sdk_api_reference_en.pdf
Here is the sketch installed on the ESP8233:
Expected behavior
Any other (phone, laptop) client device successfully connects to eaphammer without the ssl error. We can collect hashes and GTC downgraded cleartext credentials from those.
Screenshots
See copy/paste above.
Command string(s) used
EAPHammer verbose output (using the --debug flag)
The output is large, see attached:
20200227-2246-TEST-EAP.txt
EAPHammer Version (./eaphammer --version)
OS (the OS from which you are running EAPHammer)
Kali 2020.1 ARM on Raspberry Pi4
Configuration of Target Access Point (if known / applicable)
We have tested two target Access Points, the ESP8266WiFi clients are able connect to both of these without issues. We have tried the APs in EAP-PEAP and EAP-TTLS configurations without client connectivity issues.
Unifi controller with AP-PRO using built in RADIUS and test users.
Raspberry Pi1 with hostapd and local RADIUS
Configuration of Target Client Device (if known / applicable)
See sketch above. We've also experimented with the following without any affect on the problem:
wifi_station_set_enterprise_new_password
wifi_station_set_enterprise_new_user
Additional context
This is for a test lab where hardware for victim laptops and phones are extremely limited. We have a large number of these ESP8266 WiFi devices that would be perfect for this use case so we're trying to find a way to get them working.
The text was updated successfully, but these errors were encountered: