What You Need To Know About KRACK WPA2 Wi-Fi Attack

What You Need To Know About KRACK WPA2 Wi-Fi Attack

The Internet has been blowing up in the past week about the KRACK WPA2 attack that is extremely widespread and is a flaw in the Wi-Fi standard itself, not the implementation. It’s a flaw in the 4 way handshake for WP2 compromised by a Key Reinstallation Attack.

This means any device that has correctly implemented WPA2 is likely affected (so basically everything that has Wi-Fi capability) – this includes Android, Linux, Apple, Windows, OpenBSD and more.

Read the rest of What You Need To Know About KRACK WPA2 Wi-Fi Attack now! Only available at Darknet.

Continue reading What You Need To Know About KRACK WPA2 Wi-Fi Attack

What’s the craic on KRACK?

For those who are not familiar with the Irish slang, read this. We got another fun named vulnerability this week that goes after WPA2 encryption, something that is ubiquitous but not impenetrable. Key Reinstallation Attacks, or KRACK for short, exposes a weakness in the WPA2 protocol. It’s an attack on the protocol itself, so anything […]

The post What’s the craic on KRACK? appeared first on Security Boulevard.

Continue reading What’s the craic on KRACK?

Smashing Security podcast #048: KRACK, North Korea, and an 18th century cyber attack

Smashing Security podcast #048: KRACK, North Korea, and an 18th century cyber attack

KRACK! Has the Wi-Fi vulnerability got you worried? Did North Korea hack a British TV company? And what have Dutch police learnt from Pokémon?

All this and more is discussed in the latest edition of the “Smashing Security” podcast by Graham Cluley and Carole Theriault, joined this week by Virus Bulletin editor Martijn Grooten.

Continue reading Smashing Security podcast #048: KRACK, North Korea, and an 18th century cyber attack

KRACK: will there be an exploit soon?

Given that the probability is high that there are unpatched devices left even years from now (android devices, IoT-Things, etc.):

Is it likely that there will be an exploit available soon? I think of the consequences, especially with packet forgery and still not widely used HSTS, would warrant development of an exploit and foresee a second big wardriving instance.

While it is easy for tech-savvy users to set up a VPN, for the regular user it isn’t.

Are there good reasons (for example high computational complexity of a successful attack) to make it not worthwhile to widely deploy Notebooks or pi‘s carrying out the attack with a generalized exploit?

How about botnets/Trojans with WiFi capabilities? Could they easily deploy an exploit to a wide range of (private) targets, making it less of a local attack?

Continue reading KRACK: will there be an exploit soon?

What difference does the attacker’s proximity to target / access point make to KRACK susceptibility?

In the Tools section of www.krackattacks.com it states:

We remark that the reliability of our proof-of-concept script may depend on how close the victim is to the real network. If the victim is very close to the real network, the script may fail because the victim will always directly communicate with the real network, even if the victim is (forced) onto a different Wi-Fi channel than this network.

This appears to infer that the attacker has to rely on ‘overcoming’ the access point’s signal strength in some way for the attack to be successful.

If we assume that only standards compliant antennae are used for the attack is there a practical distance or rule that can be applied to determine whether an attack is likely to be successful (assuming the connection is susceptible)?

Continue reading What difference does the attacker’s proximity to target / access point make to KRACK susceptibility?

Why is Android/Linux able to communicate with the wireless access point after the encryption key is set to zero?

As I understand it, when exploited against Linux and Android the KRACK attack results in the encryption key for the session being zeroed out on the device, so an eavesdropper can easily decrypt the messages. On other platform… Continue reading Why is Android/Linux able to communicate with the wireless access point after the encryption key is set to zero?