Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

WPA2 vulnerabilities

Key Reinstallation Attacks (KRACKs)


By
Saleh Iskandar
Taufan Prakasa
Quick Intro
Weakness in WPA2, a protocol that secures all
modern protected Wi-Fi networks has been
discovered. This novel technique, called, Key
Reinstallation Attacks (KRACKS).
This attack reset key on client side during 4-way
handsake. Then the attacker can decrypt and
forge packets from and to client/victims,
making it possible to steal and hijack various
sensitive information.
4-way handshake
Let us take a look at the
diagram.
At 4-way handshake message-3
due to transmission lost or
potential interference, this
message can be sent multiple
times. Thus causing client to
install the same-key many time
and causing counter packet
(nonce) to reset.
Hence, the terms reinstallation
key comes into play.
Affected client devices
Linux and Android is mostly
affected due to predictable
all-zero encryption key
during reinstallation key
due to a bug.
Demo

https://youtu.be/Oh4WURZoR98
Cisco WLC Fixed release
Source :
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-
20171016-wpa#fixed_software

You might also like