29
/pt/
pt
AIzaSyAYiBZKx7MnpbEhh9jyipgxe19OcubqV5w
April 1, 2024
156686
8289
2

16 out 2017 ano - WPA2 vuln: Key Reinstallation Attack (KRACK)

Descrição:

https://www.krackattacks.com/

Attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (e.g. the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic. Currently, all modern protected Wi-Fi networks use the 4-way handshake. This implies all these networks are affected by (some variant of) our attack. For instance, the attack works against personal and enterprise Wi-Fi networks, against the older WPA and the latest WPA2 standard, and even against networks that only use AES. All our attacks against WPA2 use a novel technique called a key reinstallation attack (KRACK):

Adicionado na linha do tempo:

4 dez 2018
0
0
2564
Timeline of Cyber Security Incidents
Prepared by https://cybersecurity.wtf/

Data:

16 out 2017 ano
Agora
~ 6 years and 6 months ago

YouTube:

PremiumAbout & FeedbackAcordoPrivacidade
logo
© 2022 Selected Technologies LLC – Morgan Hill, California