Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TP-Link T2U Plus (RTL8821AU) #236

Open
tyt3ool opened this issue Mar 29, 2023 · 20 comments
Open

TP-Link T2U Plus (RTL8821AU) #236

tyt3ool opened this issue Mar 29, 2023 · 20 comments

Comments

@tyt3ool
Copy link

tyt3ool commented Mar 29, 2023

Thank you for updating the information and being the main source of WiFi adapters for Linux. The TP-Link T2U Plus is widely available in many countries with a very affordable price for beginners in pentesting. Though TP-Link products support for Linux is terrible and their chipset confusion is the second downside to it, I'm curious to know your thoughts about TP-Link T2U Plus. Being "Alfa AWUS036ACHM" 10 out of 10, how do you rate other cheap/affordable alternative products for pentesting (based on full/missing features, handshake catching, long range, etc)? If managing challenging circumstances of compiling the proper driver is okay, what are the better options under $20 for pentesting?

@ZerBea
Copy link

ZerBea commented Mar 29, 2023

RTL8821AU driver is not part of the Linux stock kernel (like mt76 driver).
RTL8821AU driver does not support active monitor mode (like Alfa AWUS036ACHM or other mt76 interfaces).
TP-Link T2U Plus antenna is fixed mounted.

My rating is 0!

My recommendation:

ID 148f:761a Ralink Technology, Corp. MT7610U ("Archer T2U" 2.4G+5G WLAN Adapter
ID 148f:7601 Ralink Technology, Corp. MT7601U Wireless Adapter
ID 0e8d:7612 MediaTek Inc. MT7612U 802.11a/b/g/n/ac Wireless Adapter
ID 0b05:17d1 ASUSTek Computer, Inc. AC51 802.11a/b/g/n/ac Wireless Adapter [Mediatek MT7610U]
ID 7392:7710 Edimax Technology Co., Ltd Edimax Wi-Fi

@ZerBea
Copy link

ZerBea commented Mar 29, 2023

An example: TP-Link T2UH
MT7610U is part of the Linux stock kernel.
MT7610U provide full active monitor mode.
TP-Link T2UH external antenna not fixed mounted.

$ lsusb
ID 148f:761a Ralink Technology, Corp. MT7610U ("Archer T2U" 2.4G+5G WLAN Adapter
$ iw reg get
global
country US: DFS-FCC
	(902 - 904 @ 2), (N/A, 30), (N/A)
	(904 - 920 @ 16), (N/A, 30), (N/A)
	(920 - 928 @ 8), (N/A, 30), (N/A)
	(2400 - 2472 @ 40), (N/A, 30), (N/A)
	(5150 - 5250 @ 80), (N/A, 23), (N/A), AUTO-BW
	(5250 - 5350 @ 80), (N/A, 24), (0 ms), DFS, AUTO-BW
	(5470 - 5730 @ 160), (N/A, 24), (0 ms), DFS
	(5730 - 5850 @ 80), (N/A, 30), (N/A), AUTO-BW
	(5850 - 5895 @ 40), (N/A, 27), (N/A), NO-OUTDOOR, AUTO-BW, PASSIVE-SCAN
	(5925 - 7125 @ 320), (N/A, 12), (N/A), NO-OUTDOOR, PASSIVE-SCAN
	(57240 - 71000 @ 2160), (N/A, 40), (N/A)

$ hcxlabtool -L

Requesting interface capabilities. This may take some time.
Please be patient...

available wlan devices:

phy idx hw-mac       virtual-mac  m ifname           driver (protocol)
---------------------------------------------------------------------------------------------
  2   5 503eaaa08f6f 503eaaa08f6f * wlp5s0f3u3       mt76x0u (NETLINK & WIRELESS EXTENSIONS)

* active monitor mode available
+ monitor mode available
- no monitor mode available

bye-bye
$ hcxlabtool -I wlp5s0f3u3

Requesting interface capabilities. This may take some time.
Please be patient...

interface information:

phy idx hw-mac       virtual-mac  m ifname           driver (protocol)
---------------------------------------------------------------------------------------------
  2   5 503eaaa08f6f 503eaaa08f6f * wlp5s0f3u3       mt76x0u (NETLINK & WIRELESS EXTENSIONS)


available frequencies: frequency [channel] tx-power

  2412 [  1] 14.0 dBm	  2417 [  2] 14.0 dBm	  2422 [  3] 14.0 dBm	  2427 [  4] 14.0 dBm
  2432 [  5] 14.0 dBm	  2437 [  6] 14.0 dBm	  2442 [  7] 14.0 dBm	  2447 [  8] 14.0 dBm
  2452 [  9] 14.0 dBm	  2457 [ 10] 14.0 dBm	  2462 [ 11] 14.0 dBm	  2467 [ 12] disabled
  2472 [ 13] disabled	  2484 [ 14] disabled	  5180 [ 36] 17.0 dBm	  5200 [ 40] 17.0 dBm
  5220 [ 44] 17.0 dBm	  5240 [ 48] 17.0 dBm	  5260 [ 52] 17.0 dBm	  5280 [ 56] 17.0 dBm
  5300 [ 60] 17.0 dBm	  5320 [ 64] 17.0 dBm	  5500 [100] 17.0 dBm	  5520 [104] 17.0 dBm
  5540 [108] 17.0 dBm	  5560 [112] 17.0 dBm	  5580 [116] 17.0 dBm	  5600 [120] 17.0 dBm
  5620 [124] 17.0 dBm	  5640 [128] 17.0 dBm	  5660 [132] 17.0 dBm	  5680 [136] 17.0 dBm
  5700 [140] 17.0 dBm	  5720 [144] 17.0 dBm	  5745 [149] 17.0 dBm	  5765 [153] 17.0 dBm
  5785 [157] 17.0 dBm	  5805 [161] 17.0 dBm	  5825 [165] 17.0 dBm	  5845 [169] 17.0 dBm
  5865 [173] 17.0 dBm

bye-bye

@tyt3ool
Copy link
Author

tyt3ool commented Mar 29, 2023

Thank you for answering my question. Are any commands completely compromised by these alternative models?

@ZerBea
Copy link

ZerBea commented Mar 29, 2023

Regarding that this devices are cheap, yes.
Please notice, you're looking for an interface, suitable to run penetration tests.
Beside chipset and driver it depend highly on the penetration testing software.
If you know, what you're doing the results may be amazing even though if you use a nano adapter like this cheap one:
https://www.reichelt.de/de/en/allnet-wireless-nano-usb-adapter-150-mbit-s-allnet-allwa0150-p149756.html?CCOUNTRY=445&LANGUAGE=en

Do you have an Alfa AWUS036ACHM?

@ZerBea
Copy link

ZerBea commented Mar 29, 2023

Get some more information here:
https://github.com/ZerBea/hcxdumptool/wiki/WiFi-Adapters
like this one (ID 7392:7710 Edimax Technology Co., Ltd Edimax Wi-Fi)
https://github.com/ZerBea/hcxdumptool/wiki/Penetration-testing-system-2
or the nano adapter mentioned above:
https://github.com/ZerBea/hcxdumptool/wiki/Penetration-testing-system-1

@tyt3ool
Copy link
Author

tyt3ool commented Mar 29, 2023

Do you have an Alfa AWUS036ACHM?

No, I want to purchase one but was thinking of trying with a cheaper one first.

https://github.com/ZerBea/hcxdumptool/wiki/WiFi-Adapters

Unfortunately none of them are offered by local vendors, and the international delivery cost is nearly half or equal to the cost of the adapter. The market is full of Comfast and TP-Link adapters such as:
CF-924AC (RTL8812BU)
CF-WU713N (MT7603)
CF-WU757F V2 (RTL8188GU)
CF-951AX (MT7921AU)
CF-939AC (RTL8814AU)
CF-WU783AC (RTL8814AU)
CF-WU782AC V2 (MT7612UN)
CF-WU781A (RTL8811CU)
CF-821AC (RTL8811CU)
CF-928AC (MT7612U)
CF-953AX (MT7921AU)
CF-WU785AC (MT7612u)
CF-759BF (RTL8821CU)
CF-781AC (RTL8811CU)
CF-782AC (RTL8811CU)
CF-927BF (RTL8822BU)
CF-955AX (RTL8832BU)
CF-WU711N (MT7601)
CF-926AC (MT7612U)
And a dozen of unbranded adapters based on AR9271, RT3070, RT3070L, MT7601U, RTL8811CU chipsets.

I might just go for the AWUS036ACHM because of its positive reputation but it would be nice to know other great products that can be purchased easily as needed.

@ZerBea
Copy link

ZerBea commented Mar 29, 2023

For the first steps a cheap adapter running a mt7601U should do it.

An AWUS036ACHM is a real beast. It is able to retrieve hundreds of hashes (EAPOL MESSAGEPAIRs and PMKIDs) in a very short time.

$ hcxpcapngtool AWUS036ACHM.pcapng -o hash.hc22000
hcxpcapngtool 6.2.9 reading from AWUS036ACHM.pcapng...

summary capture file
--------------------
file name................................: AWUS036ACHM.pcapng
version (pcapng).........................: 1.0
operating system.........................: Linux 5.15.32+
application..............................: hcxlabtool 2.0.0
interface name...........................: wlan0
interface vendor.........................: 00c0ca
openSSL version..........................: 1.0
weak candidate...........................: 12345678
MAC ACCESS POINT.........................: 000e17d2dcfc (incremented on every new client)
MAC CLIENT...............................: acde48faba3c
REPLAYCOUNT..............................: 64129
ANONCE...................................: 35d62366994d0a53bdde658ca88274af144007133c9e9fdd45b89181b54076d4
SNONCE...................................: 219681af95fcbf17d35b5557f006722a0652a6a060c6715d3c2ac4ba84aaf08a
timestamp minimum (GMT)..................: 21.03.2023 19:15:28
timestamp maximum (GMT)..................: 21.03.2023 20:26:12
used capture interfaces..................: 1
link layer header type...................: DLT_IEEE802_11_RADIO (127)
endianess (capture system)...............: little endian
packets inside...........................: 27494
packets received on 2.4 GHz..............: 26777
packets received on 5 GHz................: 100
WIRELESS DISTRIBUTION SYSTEM.............: 242
ESSID (total unique).....................: 1076
BEACON (total)...........................: 2170
BEACON on 2.4 GHz channel (from IE_TAG)..: 1 2 3 4 5 6 7 8 9 10 11 13 
BEACON on 5/6 GHz channel (from IE-TAG)..: 36 100 
BEACON (SSID wildcard/unset).............: 204
BEACON (SSID zeroed).....................: 16
ACTION (total)...........................: 50
ACTION (containing ESSID)................: 49
PROBEREQUEST.............................: 424
PROBEREQUEST (directed)..................: 130
PROBERESPONSE (total)....................: 1370
PROBERESPONSE (SSID unset)...............: 1
AUTHENTICATION (total)...................: 2436
AUTHENTICATION (OPEN SYSTEM).............: 2436
ASSOCIATIONREQUEST (total)...............: 509
ASSOCIATIONREQUEST (PSK).................: 509
REASSOCIATIONREQUEST (total).............: 154
REASSOCIATIONREQUEST (PSK)...............: 151
REASSOCIATIONREQUEST (SAE SHA256)........: 1
EAPOL messages (total)...................: 20250
EAPOL RSN messages.......................: 20246
EAPOL WPA messages.......................: 4
EAPOLTIME gap (measured maximum msec)....: 48336
EAPOL ANONCE error corrections (NC)......: working
REPLAYCOUNT gap (suggested NC)...........: 1024
EAPOL M1 messages (total)................: 17143
EAPOL M2 messages (total)................: 1160
EAPOL M3 messages (total)................: 1578
EAPOL M4 messages (total)................: 369
EAPOL pairs (total)......................: 4209
EAPOL pairs (best).......................: 313
EAPOL ROGUE pairs........................: 172
EAPOL pairs written to 22000 hash file...: 313 (RC checked)
EAPOL M12E2 (challenge)..................: 201
EAPOL M32E2 (authorized).................: 111
EAPOL M34E4 (authorized).................: 1
RSN PMKID (useless)......................: 111
RSN PMKID (total)........................: 286
RSN PMKID (best).........................: 63
RSN PMKID ROGUE..........................: 53
RSN PMKID written to 22000 hash file.....: 63
malformed packets (total)................: 1
IE TAG length error (malformed packets)..: 1

frequency statistics from radiotap header (frequency: received packets)
-----------------------------------------------------------------------
 2412: 8151	 2417: 28	 2422: 12	 2427: 32	
 2432: 15	 2437: 8489	 2442: 164	 2447: 62	
 2452: 32	 2457: 11	 2462: 9752	 2467: 8	
 2472: 21	 5180: 58	 5500: 42	

session summary
---------------
processed pcapng files................: 1

For a penetration tester, it should be the best choice.

For comparison: ASUS AC51

$ lsusb
ID 0b05:17d1 ASUSTek Computer, Inc. AC51 802.11a/b/g/n/ac Wireless Adapter [Mediatek MT7610U]

Big difference between external antenna (ALFA) and onboard antenna (ASUS).
Please notice: TX power is meaningless - a good external antenna (e.g. panel) is all.

$ hcxpcapngtool ASUSAC51.pcapng -o test.hc22000
hcxpcapngtool 6.2.9 reading from ASUSAC51.pcapng...

summary capture file
--------------------
file name................................: ASUSAC51.pcapng
version (pcapng).........................: 1.0
operating system.........................: Linux 5.15.32+
application..............................: hcxlabtool 2.0.0
interface name...........................: wlan0
interface vendor.........................: 3c7c3f
openSSL version..........................: 1.0
weak candidate...........................: 12345678
MAC ACCESS POINT.........................: 544e4552c687 (incremented on every new client)
MAC CLIENT...............................: e804106234c5
REPLAYCOUNT..............................: 65439
ANONCE...................................: 89201675e3305de41b46dc4bdbf05123ecbbed3e7714840fb9de0c51cff21e7b
SNONCE...................................: 11df2b3b47c2173941be373b268a5bda4303b051edd5f820d4162ae84321168a
timestamp minimum (GMT)..................: 21.03.2023 07:51:00
timestamp maximum (GMT)..................: 21.03.2023 11:10:30
used capture interfaces..................: 1
link layer header type...................: DLT_IEEE802_11_RADIO (127)
endianess (capture system)...............: little endian
packets inside...........................: 37850
packets received on 2.4 GHz..............: 36888
packets received on 5 GHz................: 222
ESSID (total unique).....................: 1304
BEACON (total)...........................: 2141
BEACON on 2.4 GHz channel (from IE_TAG)..: 1 2 3 4 5 6 7 8 9 10 11 12 13 
BEACON on 5/6 GHz channel (from IE-TAG)..: 36 100 
BEACON (SSID wildcard/unset).............: 188
BEACON (SSID zeroed).....................: 23
ACTION (total)...........................: 38
ACTION (containing ESSID)................: 38
PROBEREQUEST.............................: 480
PROBEREQUEST (directed)..................: 61
PROBERESPONSE (total)....................: 1317
PROBERESPONSE (SSID unset)...............: 13
PROBERESPONSE (SSID zeroed)..............: 1
AUTHENTICATION (total)...................: 1648
AUTHENTICATION (OPEN SYSTEM).............: 1648
ASSOCIATIONREQUEST (total)...............: 242
ASSOCIATIONREQUEST (PSK).................: 234
ASSOCIATIONREQUEST (SAE SHA256)..........: 1
REASSOCIATIONREQUEST (total).............: 73
REASSOCIATIONREQUEST (PSK)...............: 68
REASSOCIATIONREQUEST (SAE SHA256)........: 1
EAPOL messages (total)...................: 31850
EAPOL RSN messages.......................: 31848
EAPOL WPA messages.......................: 2
EAPOLTIME gap (measured maximum msec)....: 78401
EAPOL ANONCE error corrections (NC)......: working
REPLAYCOUNT gap (suggested NC)...........: 1024
EAPOL M1 messages (total)................: 29951
EAPOL M1 messages (KDV:0 AKM defined)....: 3 (PMK not recoverable)
EAPOL M2 messages (total)................: 980
EAPOL M2 messages (KDV:0 AKM defined)....: 2 (PMK not recoverable)
EAPOL M3 messages (total)................: 745
EAPOL M3 messages (KDV:0 AKM defined)....: 4 (PMK not recoverable)
EAPOL M4 messages (total)................: 174
EAPOL M4 messages (KDV:0 AKM defined)....: 1 (PMK not recoverable)
EAPOL pairs (total)......................: 14627
EAPOL pairs (best).......................: 133
EAPOL ROGUE pairs........................: 76
EAPOL pairs written to 22000 hash file...: 133 (RC checked)
EAPOL M12E2 (challenge)..................: 87
EAPOL M32E2 (authorized).................: 45
EAPOL M34E4 (authorized).................: 1
RSN PMKID (useless)......................: 122
RSN PMKID (total)........................: 151
RSN PMKID (best).........................: 36
RSN PMKID ROGUE..........................: 32
RSN PMKID (KDV:0 AKM defined)............: 3 (PMK not recoverable)
RSN PMKID written to 22000 hash file.....: 36
malformed packets (total)................: 1
IE TAG length error (malformed packets)..: 1

frequency statistics from radiotap header (frequency: received packets)
-----------------------------------------------------------------------
 2412: 3266	 2417: 44	 2422: 35	 2427: 21	
 2432: 155	 2437: 29427	 2442: 53	 2447: 11	
 2452: 12	 2457: 230	 2462: 3618	 2467: 12	
 2472: 4	 5180: 141	 5500: 81	


session summary
---------------
processed pcapng files................: 1




@ZerBea
Copy link

ZerBea commented Mar 29, 2023

ASUS AC51 information:

$ hcxlabtool -L

Requesting interface capabilities. This may take some time.
Please be patient...


available wlan devices:

phy idx hw-mac       virtual-mac  m ifname           driver (protocol)
---------------------------------------------------------------------------------------------
  7  10 0c9d92b486ca a6658b06d347 * wlp5s0f3u2       mt76x0u (NETLINK & WIRELESS EXTENSIONS)

* active monitor mode available
+ monitor mode available
- no monitor mode available

bye-bye
$ hcxlabtool -I wlp5s0f3u2

Requesting interface capabilities. This may take some time.
Please be patient...


interface information:

phy idx hw-mac       virtual-mac  m ifname           driver (protocol)
---------------------------------------------------------------------------------------------
  7  10 0c9d92b486ca a6658b06d347 * wlp5s0f3u2       mt76x0u (NETLINK & WIRELESS EXTENSIONS)


available frequencies: frequency [channel] tx-power

  2412 [  1] 16.0 dBm	  2417 [  2] 16.0 dBm	  2422 [  3] 16.0 dBm	  2427 [  4] 16.0 dBm
  2432 [  5] 16.0 dBm	  2437 [  6] 16.0 dBm	  2442 [  7] 16.0 dBm	  2447 [  8] 16.0 dBm
  2452 [  9] 16.0 dBm	  2457 [ 10] 16.0 dBm	  2462 [ 11] 16.0 dBm	  2467 [ 12] disabled
  2472 [ 13] disabled	  2484 [ 14] disabled	  5180 [ 36] 20.0 dBm	  5200 [ 40] 20.0 dBm
  5220 [ 44] 20.0 dBm	  5240 [ 48] 20.0 dBm	  5260 [ 52] 20.0 dBm	  5280 [ 56] 20.0 dBm
  5300 [ 60] 20.0 dBm	  5320 [ 64] 20.0 dBm	  5500 [100] 20.0 dBm	  5520 [104] 20.0 dBm
  5540 [108] 20.0 dBm	  5560 [112] 20.0 dBm	  5580 [116] 20.0 dBm	  5600 [120] 20.0 dBm
  5620 [124] 20.0 dBm	  5640 [128] 20.0 dBm	  5660 [132] 20.0 dBm	  5680 [136] 20.0 dBm
  5700 [140] 20.0 dBm	  5720 [144] 20.0 dBm	  5745 [149] 20.0 dBm	  5765 [153] 20.0 dBm
  5785 [157] 20.0 dBm	  5805 [161] 20.0 dBm	  5825 [165] 20.0 dBm	  5845 [169] 20.0 dBm
  5865 [173] 20.0 dBm

bye-bye

Do not wonder about the MAC addresses - hcxlabtool is running its own MAC address pool.

@ZerBea
Copy link

ZerBea commented Mar 29, 2023

Even the cheapest mt76 adapter support active monitor mode:
https://4.bp.blogspot.com/-bWDe3SYr0WE/VvCybE7ofzI/AAAAAAAAB0U/xQPQeTjkSy8fF3Rzuhd4OGCawy3YgSUfg/w858-h520-no/adaptador%2Bde%2Brede%2Bsem%2Bfio%2BRalink.jpg

$ lsusb
ID 148f:7601 Ralink Technology, Corp. MT7601U Wireless Adapter
$ hcxlabtool -L

Requesting interface capabilities. This may take some time.
Please be patient...


available wlan devices:

phy idx hw-mac       virtual-mac  m ifname           driver (protocol)
---------------------------------------------------------------------------------------------
  8  11 76013d100942 6ea417f7bc34 * wlp5s0f3u2       mt7601u (NETLINK & WIRELESS EXTENSIONS)

* active monitor mode available
+ monitor mode available
- no monitor mode available

bye-bye
$ hcxlabtool -I wlp5s0f3u2

Requesting interface capabilities. This may take some time.
Please be patient...


interface information:

phy idx hw-mac       virtual-mac  m ifname           driver (protocol)
---------------------------------------------------------------------------------------------
  8  11 76013d100942 6ea417f7bc34 * wlp5s0f3u2       mt7601u (NETLINK & WIRELESS EXTENSIONS)


available frequencies: frequency [channel] tx-power

  2412 [  1] 20.0 dBm	  2417 [  2] 20.0 dBm	  2422 [  3] 20.0 dBm	  2427 [  4] 20.0 dBm
  2432 [  5] 20.0 dBm	  2437 [  6] 20.0 dBm	  2442 [  7] 20.0 dBm	  2447 [  8] 20.0 dBm
  2452 [  9] 20.0 dBm	  2457 [ 10] 20.0 dBm	  2462 [ 11] 20.0 dBm	  2467 [ 12] 20.0 dBm
  2472 [ 13] 20.0 dBm	  2484 [ 14] disabled

bye-bye

Do not trust the TX power reported by the driver. Mostly it is less (much less) than reported.

Monitor mode can be set by a simple command (ifconfig, iwconfig, ip, iw are obsolete):

$ sudo hcxlabtool -m wlp5s0f3u2

Requesting interface capabilities. This may take some time.
Please be patient...

interface information:

phy idx hw-mac       virtual-mac  m ifname           driver (protocol)
---------------------------------------------------------------------------------------------
  9  12 0c9d92b486ca c2d3e8808e52 * wlp5s0f3u2       mt76x0u (NETLINK & WIRELESS EXTENSIONS)


available frequencies: frequency [channel] tx-power

  2412 [  1] 16.0 dBm	  2417 [  2] 16.0 dBm	  2422 [  3] 16.0 dBm	  2427 [  4] 16.0 dBm
  2432 [  5] 16.0 dBm	  2437 [  6] 16.0 dBm	  2442 [  7] 16.0 dBm	  2447 [  8] 16.0 dBm
  2452 [  9] 16.0 dBm	  2457 [ 10] 16.0 dBm	  2462 [ 11] 16.0 dBm	  2467 [ 12] 16.0 dBm
  2472 [ 13] 16.0 dBm	  2484 [ 14] disabled	  5180 [ 36] 20.0 dBm	  5200 [ 40] 20.0 dBm
  5220 [ 44] 20.0 dBm	  5240 [ 48] 20.0 dBm	  5260 [ 52] 20.0 dBm	  5280 [ 56] 20.0 dBm
  5300 [ 60] 20.0 dBm	  5320 [ 64] 20.0 dBm	  5500 [100] 20.0 dBm	  5520 [104] 20.0 dBm
  5540 [108] 20.0 dBm	  5560 [112] 20.0 dBm	  5580 [116] 20.0 dBm	  5600 [120] 20.0 dBm
  5620 [124] 20.0 dBm	  5640 [128] 20.0 dBm	  5660 [132] 20.0 dBm	  5680 [136] 20.0 dBm
  5700 [140] 20.0 dBm	  5720 [144] 20.0 dBm	  5745 [149] 20.0 dBm	  5765 [153] 20.0 dBm
  5785 [157] 20.0 dBm	  5805 [161] 20.0 dBm	  5825 [165] 20.0 dBm	  5845 [169] 20.0 dBm
  5865 [173] 20.0 dBm

monitor mode is active...

bye-bye

@ZerBea
Copy link

ZerBea commented Mar 29, 2023

@morrownr how about adding an information about "active monitor mode" and its (huge) advantage to USB-WiFi?
I noticed that you don't get benefit of it:
https://github.com/morrownr/Monitor_Mode/blob/main/start-mon.sh#L140

@tyt3ool
Copy link
Author

tyt3ool commented Mar 31, 2023

It would be great to have a list of chipsets and drivers that are supporting active monitor mode, as there may be more options available beyond the ones mentioned in the #73 (mt7921, mt7612u, mt7610u, mt7601u).

Do these mentioned USB adapters work with Android phones?

@ZerBea
Copy link

ZerBea commented Mar 31, 2023

I agree, it would be great to have all this additional information on USB-WiFi.
Regarding Android drivers, this I suggest to ask here:
https://forum.xda-developers.com/

@morrownr
Copy link
Owner

@ZerBea
@tyt3ool

I agree. Who wants to be in charge of making it happen and where should it go?

I say this because I am basically maxed out. I could use help.

@ZerBea
Copy link

ZerBea commented Mar 31, 2023

Unfortunately public information about active monitor mode is very rare. As far as I know, only mt76 drivers provide this feature.
openwrt/mt76#310
It took me several month to figure out how it exactly works and to discover its limitations (e.g. ACK only frames addressed to interface MAC - can be the virtual MAC).

@morrownr
Copy link
Owner

Unfortunately public information about active monitor mode is very rare.

Let's make it more public.

As far as I know, only mt76 drivers provide this feature.

My bet is that all in-kernel drivers support it because it is probably supported in the stack the in-kernel drivers use. I can test an Atheros adapter later... and maybe some Ralink adapters.

@ZerBea
Copy link

ZerBea commented Mar 31, 2023

I fully agree since we have this attribute in linux/nl80211.h
https://github.com/torvalds/linux/blob/master/include/uapi/linux/nl80211.h#L4524

Realtek drivers could be the next ones providing active monitor.
@kimocoder mentioned that.
https://github.com/kimocoder/realtek_rtwifi
I suspect this one will be one of the first ones, providing this feature, too.

@ZerBea
Copy link

ZerBea commented Mar 31, 2023

If you take a look at the injection radiotap header of hcxlabtool:
https://github.com/ZerBea/wifi_laboratory/blob/main/include/radiotap.h#L55
even the example from here:
https://www.kernel.org/doc/html/latest/networking/radiotap-headers.html
looks a little bit outdated.

If we request a PMKID from an ACCESS POINT (AP) while running monitor mode, it is mandatory that we ACK the frames coming from the AP. If not, the AP will deauthenticate us. Additional it is mandatory that we resend a frame, if the AP doesn't ACK the frame we have sent.
The same applies if we request an EAPOL M2 from a CLIENT or an EAP-ID.
Discovering weak points of 802.11 is more (much more) than injecting stupid deauthentication frames (old school - that doesn't work if Management Frame Protection [MFP] is active).
The combination of the radiatap header mentioned above and active monitor ensures this. It would be great to have this feature in all drivers.

@ZerBea
Copy link

ZerBea commented Apr 11, 2023

@morrownr , while hunting for a bug on rtl8xxxu, we discussed active monitor mode, too:
https://bugzilla.kernel.org/show_bug.cgi?id=217205
and decided to open a feature request:
https://bugzilla.kernel.org/show_bug.cgi?id=217319

@morrownr
Copy link
Owner

It would be nice if a feature request went in for the rtw88 driver as well. I was testing the rtw88 on a rtl8812bu based adapter this morning with kernel 6.3. The performance and stability has increased a lot since 6.1. Heck, it is usable now.

@ZerBea
Copy link

ZerBea commented Apr 12, 2023

For sure, it will be and I can confirm your experience regarding rtw88.
Kernel 6.3 making life a little bit easier.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants