Nzyme v2.0.0-alpha.9 has been released

January 10, 2024

Happy New Year if your calendar is of the Gregorian kind! We are back from some relaxing holiday weeks and have been at work since. Today, we are releasing nzyme v2.0.0-alpha.9. We did skip alpha.7 and alpha.8 due to bugs discovered immediately after version tagging.

Let’s look at what’s new!

Changelog

  • New Feature: WiFi Monitored Network Configuration Import
  • New Feature: WiFi Restricted SSID Substring and Similar SSID Alerts
  • New Feature: WiFi Protected Management Frames (PMF) Detection
  • New Feature: WiFi Client and Access Point signal strength by tap
  • Improvements to WPA3 detection and handling of different WiFi security suites
  • Reliable handling of NULL bytes and empty characters in SSIDs
  • Fingerprint debugging
  • Many bugfixes and improvements. Some are fairly large. Please let us know if anything stopped working or was better before.

New Feature: WiFi Monitored Network Configuration Import

You have to add every access point serving your network, together with their fingerprints, security settings and used channels to your configuration if you want to fully monitor it. This is not very hard to do if you have one or two access points at home, but becomes a real problem if you have hundreds of access points, possibly operating on several different WiFi bands.

We added the long awaited configuration import feature in this release.

nzyme Screenshot
The new configuration import dialog.

You can now use the configuration that nzyme already collects about your network and automatically add it to the monitoring configuration.

Of course, you should always cross-check the imported configuration with a known-good state to prevent the accidental import of BSSIDs and other data associated with potential bad actors already active within your network environment.

This will save a lot of typing and copying and pasting.

New Feature: WiFi Restricted SSID Substring and Similar SSID Alerts

An attacker could try to lure you or your colleagues to join a network under their control using a similar sounding SSID.

For example, let’s say your legitimate network is called UmbrellaCorp and a new network called UmbrellaCorpGuest or UmbrelaCorp (with one l) under the control of the attackers appears. Would you find this out in time before someone connects to it? Even worse, an attacker may use a deauthentication attack to knock devices off the network and make people look for legitimate sounding alternatives.

Two new alerts in nzyme cover this:

  • You could set up the Restricted Substring alert for the substring Umbrella and receive an alert the moment a network with a name including that string appears.
  • You could set up the Similar SSID alert and be alerted because the UmbrelaCorp (with one l) crosses your configured similarity percentage threshold.
nzyme Screenshot
Configuring the Similar SSID alert for a monitored network.

New Feature: WiFi Protected Management Frames (PMF) Detection

WiFi networks can enable Protected Management Frames (PMF) when using WPA2 or WPA3. PMF protects some types of management frames from being spoofed or recorded in cleartext by listeners. They must be required in WPA3-secured networks and can be disabled, optional or required in WPA2-secured networks.

Adoption is increasing but not very widespread yet because of compatibility issues in many WiFi devices.

Starting with this release, nzyme is recording the PMF setting for each SSID and adding it to the security suites string.

For example, the nzyme security suites string of a WPA2 network with disabled PMF now looks like this: CCMP-CCMP/PSK+PMF_DISABLED

You have to adapt existing monitored security suite strings because of this added parameter. This is covered in the upgrade notes.

New Feature: WiFi Client and Access Point Signal Strength by Tap

The BSSID and client details pages are now showing the recent average signal strength per tap:

nzyme Screenshot
Recent signal strength of an access point, showing a single tap in action.

This is a small change but part of a larger addition of signal strength analysis and … dare we say it … physical location mapping.

We are also starting to collect client signal strengths with this release. You can expect a waterfall histogram analysis like for access points in the next release.

Improvements to WPA3 Detection and Handling of Different WiFi Security Suites

We improved the part of the tap code that decides what security protocol (None/Open, Enhanced Open, WEP, WPA1, WPA2, WPA3, WPA3 192 bit, various transition modes) a SSID uses. This change introduces added accuracy and fixes some bugs in the old code. We are now reliably detecting the security protocol and show more information.

On top of that, we improved how we collect and display networks that are advertised with different security settings during a single tap collection cycle. We are now accurately detecting if, for example, the same network is advertised as an open network and a WPA2 network - a common situation when rogue access points are in action.

nzyme Screenshot
Recorded security configuration of an SSID.

Reliable Handling of NULL Bytes and Empty Characters in SSIDS

SSIDs support unicode. This does not only mean that you can add emojis to your network names (you are welcome), but also that crafty attackers can use confusing unicode characters to trick someone to connect to their malicious WiFi.

For example, an attacker could include NULL bytes or “empty characters” in the SSID - invisible to the human eye and not rendered on your phone or laptop network list.

nzyme Screenshot
Two identical-looking SSIDs, one with invisible/empty characters.

This new nzyme release is filtering out NULL bytes and empty characters from SSIDs. This way, nzyme is seeing the network names like a human eye would and can effectively alert on any malicious attempts related to SSID crafting. The above-mentioned similar sounding SSID and restricted SSID substring alerts will just transparently work, no matter how clever an attacker gets with invisible characters. The same applies to all other network monitoring alerts that will now pick up on it.

nzyme Screenshot
Hidden characters in the nzyme web interface, before the new filtering feature was implemented.

Fingerprint Debugging

Sometimes nzyme may record more than one or two fingerprints for a transmitter, rendering the fingerprint-based detection methods virtually unusable. You can now enable fingerprint debugging to find out which frame parameters are causing the changes in fingerprints.

This new feature is documented here.

Download & Upgrading

All packages are available for download on the downloads page. Upgrading is easy. Please follow the release notes on the downloads page.

New installations should follow the installation documentation.

How can I help?

You are some of the first users to try out nzyme v2.0.0, and we are looking for any kind of feedback:

  • What didn’t work, what bugs did you experience?
  • What was confusing or seemingly unnecessarily complex?
  • What is missing?
  • What do you think should be changed?

Again, this is an early release and no feelings will be hurt.

You can file issues on GitHub, join the nzyme Discord or post in the discussion forums to provide your feedback or ask questions.

  RSS Feed

You can subscribe to the nzyme blog using our RSS feed.
Follow Us