13
/
en
AIzaSyCYaC8UkdPkQKLFUmpasLV5eC3M802CrcA
156686
8289
2

oct 16, 2017 - WPA2 vuln: Key Reinstallation Attack (KRACK)

Description:

https://www.krackattacks.com/

Attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (e.g. the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic. Currently, all modern protected Wi-Fi networks use the 4-way handshake. This implies all these networks are affected by (some variant of) our attack. For instance, the attack works against personal and enterprise Wi-Fi networks, against the older WPA and the latest WPA2 standard, and even against networks that only use AES. All our attacks against WPA2 use a novel technique called a key reinstallation attack (KRACK):

Added to timeline:

18 days ago
0
0
911
CyberSecurityAssessor.ninja

Date:

oct 16, 2017
Now
~ 10 months ago

YouTube:

FeedbackAboutTermsPrivacy