KRACK - Attack Against WPA2 Wi Fi Protocol | DailyCyber 132

preview_player
Показать описание
In today’s DailyCyber 132, I share a little bit of my weekend in Ottawa, what I am studying in Penetration testing and KRACK a new attack against WPA2 Wi-Fi Protocol which you don’t want to miss. This appears to affect everyone who has a Wi-Fi access point, work, home, your local coffee shop, yes everyone.

Make sure you comment and share this video with everyone you know.

What is in the news:

1) KRACK Demo: Critical Key Reinstallation Attack Against Widely-Used WPA2 Wi-Fi Protocol

Security researchers have discovered several key management vulnerabilities in the core of Wi-Fi Protected Access II (WPA2) protocol that could allow an attacker to hack into your Wi-Fi network and eavesdrop on the Internet communications.

WPA2 is a 13-year-old WiFi authentication scheme widely used to secure WiFi connections, but the standard has been compromised, impacting almost all Wi-Fi devices—including in our homes and businesses, along with the networking companies that build them.
Dubbed KRACK—Key Reinstallation Attack


Highlights:

1) KRACK attack does not help attackers recover the targeted WiFi's password; instead, it allows them to decrypt WiFi users' data without cracking or knowing the actual password. Changing your Wi-Fi password will not prevent this KRACK attack

2) The research titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, has been published by Mathy Vanhoef of KU Leuven and Frank Piessens of imec-DistriNet, Nitesh Saxena and Maliheh Shirvanian of the University of Alabama at Birmingham, Yong Li of Huawei Technologies, and Sven Schäge of Ruhr-Universität Bochum.

How -
For a successful KRACK attack, an attacker needs to trick a victim into re-installing an already-in-use key, which is achieved by manipulating and replaying cryptographic handshake messages.

"When the victim reinstalls the key, associated parameters such as the incremental transmit packet number (i.e. nonce) and receive packet number (i.e. replay counter) are reset to their initial value," the researcher writes.

"Essentially, to guarantee security, a key should only be installed and used once. Unfortunately, we found this is not guaranteed by the WPA2 protocol. By manipulating cryptographic handshakes, we can abuse this weakness in practice."

"Decryption of packets is possible because a key reinstallation attack causes the transmit nonces (sometimes also called packet numbers or initialization vectors) to be reset to zero. As a result, the same encryption key is used with nonce values that have already been used in the past," the researcher say.

Resources:

Рекомендации по теме
Комментарии
Автор

I'd like to talk to you about your experiences with Sec+, the goods, the ads, the ugly...
I've watched a few of your videos about it and I'd like to extend on those if it's cool.

Nellyrcb