29
/fr/
fr
AIzaSyAYiBZKx7MnpbEhh9jyipgxe19OcubqV5w
April 1, 2024
156686
8289
2

16 oct. 2017 - WPA2 vuln: Key Reinstallation Attack (KRACK)

Description:

https://www.krackattacks.com/

Attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (e.g. the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic. Currently, all modern protected Wi-Fi networks use the 4-way handshake. This implies all these networks are affected by (some variant of) our attack. For instance, the attack works against personal and enterprise Wi-Fi networks, against the older WPA and the latest WPA2 standard, and even against networks that only use AES. All our attacks against WPA2 use a novel technique called a key reinstallation attack (KRACK):

Ajouté au bande de temps:

4 déc. 2018
0
0
2570
Timeline of Cyber Security Incidents
Prepared by https://cybersecurity.wtf/

Date:

16 oct. 2017
Maintenaint
~ Il y a 6 ans et 6 mois

YouTube:

PremiumAbout & FeedbackUn accordConfidentialité
logo
© 2022 Selected Technologies LLC – Morgan Hill, California