KRACK attack ~ New WPA2 Attack! 10-16-2017, 11:55 AM
#1
Today I present to you KRACK Attack.
KRACK of Key Reinstallation Attack basically reinstalls the already-in-use key, this affects the 4 Handshake to generate a fresh key, this 14 year old handshake has never been kracked until now, Any device that uses Wi-Fi is likely vulnerable.
First of all the demo.
Second the paper.
Paper
CVE(s)
And finally their website:
KrackAttack
They will be releasing the code after everyone has had a reasonable chance to update their devices, I am very excited to try this attack out.
KRACK of Key Reinstallation Attack basically reinstalls the already-in-use key, this affects the 4 Handshake to generate a fresh key, this 14 year old handshake has never been kracked until now, Any device that uses Wi-Fi is likely vulnerable.
First of all the demo.
Second the paper.
Paper
CVE(s)
- CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake.
- CVE-2017-13078: Reinstallation of the group key (GTK) in the 4-way handshake.
- CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way handshake.
- CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake.
- CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake.
- CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it.
- CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake.
- CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake.
- CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.
- CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.
And finally their website:
KrackAttack
They will be releasing the code after everyone has had a reasonable chance to update their devices, I am very excited to try this attack out.
(This post was last modified: 10-16-2017, 12:46 PM by S3xySmurf.)
![[Image: YmmIqHV.gif]](https://i.imgur.com/YmmIqHV.gif)
Donations: 1CCR21K2fnu2yAinUTFPsVdY7u4FkjNPs5