Skip to main content

Questions tagged [krack]

KRACK is a vulnerability in the four way handshake of WPA, allowing an attacker to decrypt Wi-Fi traffic.

0 votes
0 answers
316 views

Is there a working open-source implementation of a WiFi channel-based man-in-the-middle attack out there? I have been looking for it for a while and what I found so far was this python package which ...
Aven Desta's user avatar
1 vote
0 answers
153 views

A router (or one spoofing as a router) unilaterally sent to a client an EAPOL packet 1 of 4, and then immediately sent 5 packets of EAPOL packet 3 of 4. Is this the signature of a KRACK attack? And ...
Dev Kanchen's user avatar
1 vote
2 answers
344 views

The author of the key reinstallation attack released scripts on Github to test AP and clients. To test the clients, you have to connect to a fake AP but you still need to know the pre-shared key. Of ...
Elegancia's user avatar
  • 131
2 votes
3 answers
609 views

In the past few months, we've seen the revelation of several WiFi vulnerabilities (eg KRACK). It doesn't look like NIST has updated any of its best practices. How should we configure our enterprise ...
Filipon's user avatar
  • 1,304
1 vote
1 answer
297 views

I apologise if this is a silly question, I just want to make sure I understand the impact of CVE-2017-13078 and CVE-2017-13080 correctly. Is the following assumption true? If there is just one ...
Timo Kosig's user avatar
2 votes
0 answers
181 views

KRACK consist of several vulnerabilities (https://www.kb.cert.org/vuls/id/228519). Apple released patches against CVE-2017-13077, CVE-2017-13078 and CVE-2017-13080 from what I could find in their ...
YodaFromFinland's user avatar
2 votes
1 answer
5k views

I have been trying to pen test my router with a variety of ways, long story short, it locks out indefinitely with pixie wps until I go to the router admin page and click unlock. I tried DDOS with MDK, ...
scriptbaby's user avatar
1 vote
1 answer
372 views

Is it possible to block EAPOL packets? What I'm trying to do is block the 4th message of the 4-Way-Handshake in order to trigger retransmission of message 3. This is what I thought to do. I'd like ...
user7337963's user avatar
0 votes
1 answer
346 views

I have a pretty simple question about KRACK. From what I have read it would be very common to be able to forge, decrypt, delay and block client packets as well as AP packets using KRACK. Does this ...
Forivin's user avatar
  • 1,049
9 votes
2 answers
1k views

I am trying understand one thing about the KRACK attack. I see explanations like this everywhere: The hacker interferes with the initial handshake between your device and the WiFi router in a ...
Spring's user avatar
  • 243
7 votes
1 answer
1k views

This security article from Apple says that 11.1 fixes the KRACK vulnerability for iPhone 7 and newer devices. But what about the older devices? Has Apple not fixed them or does the vulnerability not ...
stealthmode's user avatar
1 vote
0 answers
175 views

I am investigating the KRACK attack based on the published paper and their youtube video. I largely understand the attacks proposed in the paper as they are except for the completion of the ...
Clanow's user avatar
  • 21
1 vote
1 answer
1k views

Numerous Google searches found little useful information. The most comprehensive list is at http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4 and most ...
user1258361's user avatar
1 vote
2 answers
996 views

I want to create a honeypot that will detect KRACK attacks. Is there any way to detect that kind of attack, are there any traces, any information that is stored in log files (syslog for example) that ...
bartekch's user avatar
  • 121
1 vote
1 answer
612 views

Are wpa_supplicant versions prior to 2.x (e.g. 0.2.x, 0.4.x, 0.6.x, 0.7.3, etc.) also vulnerable to any of the KRACK CVEs? I've looked at the source code but it's different enough from the 2.x ...
S. Tarr's user avatar
  • 11

15 30 50 per page