Questions tagged [krack]
KRACK is a vulnerability in the four way handshake of WPA, allowing an attacker to decrypt Wi-Fi traffic.
53 questions
0 votes
0 answers
316 views
WiFi channel-based man-in-the-middle attack implementations
Is there a working open-source implementation of a WiFi channel-based man-in-the-middle attack out there? I have been looking for it for a while and what I found so far was this python package which ...
1 vote
0 answers
153 views
Is this the signature of a KRACK attack?
A router (or one spoofing as a router) unilaterally sent to a client an EAPOL packet 1 of 4, and then immediately sent 5 packets of EAPOL packet 3 of 4. Is this the signature of a KRACK attack? And ...
1 vote
2 answers
344 views
Key reinstallation attack how does it work without a pre-shared key?
The author of the key reinstallation attack released scripts on Github to test AP and clients. To test the clients, you have to connect to a fake AP but you still need to know the pre-shared key. Of ...
2 votes
3 answers
609 views
What are some best practices for WiFi security, in light of recently discovered vulnerabilities?
In the past few months, we've seen the revelation of several WiFi vulnerabilities (eg KRACK). It doesn't look like NIST has updated any of its best practices. How should we configure our enterprise ...
1 vote
1 answer
297 views
KRACK - does the ability to replay broadcast and multicast frames affect all clients in a wireless network?
I apologise if this is a silly question, I just want to make sure I understand the impact of CVE-2017-13078 and CVE-2017-13080 correctly. Is the following assumption true? If there is just one ...
2 votes
0 answers
181 views
Apple iOS and KRACK
KRACK consist of several vulnerabilities (https://www.kb.cert.org/vuls/id/228519). Apple released patches against CVE-2017-13077, CVE-2017-13078 and CVE-2017-13080 from what I could find in their ...
2 votes
1 answer
5k views
Command Syntax for KRACK pentesting [duplicate]
I have been trying to pen test my router with a variety of ways, long story short, it locks out indefinitely with pixie wps until I go to the router admin page and click unlock. I tried DDOS with MDK, ...
1 vote
1 answer
372 views
Blocking EAPOL packets [closed]
Is it possible to block EAPOL packets? What I'm trying to do is block the 4th message of the 4-Way-Handshake in order to trigger retransmission of message 3. This is what I thought to do. I'd like ...
0 votes
1 answer
346 views
Can KRACK be used to obtain wifi credentials that could be used to normally connect to an AP? [duplicate]
I have a pretty simple question about KRACK. From what I have read it would be very common to be able to forge, decrypt, delay and block client packets as well as AP packets using KRACK. Does this ...
9 votes
2 answers
1k views
Krack attack(er) sees which traffic?
I am trying understand one thing about the KRACK attack. I see explanations like this everywhere: The hacker interferes with the initial handshake between your device and the WiFi router in a ...
7 votes
1 answer
1k views
Did iOS 11.1 fix KRACK for only iPhone 7 and newer?
This security article from Apple says that 11.1 fixes the KRACK vulnerability for iPhone 7 and newer devices. But what about the older devices? Has Apple not fixed them or does the vulnerability not ...
1 vote
0 answers
175 views
Forward packages to Access Point in KRACK attack
I am investigating the KRACK attack based on the published paper and their youtube video. I largely understand the attacks proposed in the paper as they are except for the completion of the ...
1 vote
1 answer
1k views
How do I check if my router is patched against the KRACK exploit?
Numerous Google searches found little useful information. The most comprehensive list is at http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4 and most ...
1 vote
2 answers
996 views
How to detect KRACK attack?
I want to create a honeypot that will detect KRACK attacks. Is there any way to detect that kind of attack, are there any traces, any information that is stored in log files (syslog for example) that ...
1 vote
1 answer
612 views
are older wpa_supplicant versions vulnerable to KRACK?
Are wpa_supplicant versions prior to 2.x (e.g. 0.2.x, 0.4.x, 0.6.x, 0.7.3, etc.) also vulnerable to any of the KRACK CVEs? I've looked at the source code but it's different enough from the 2.x ...