Search
WPA2 Key Reinstallation Vulnerabilities (KRACK) Explained
Posted by Hemant Chaskar on Oct 16, 2017
WPA2 Vulnerability.png

Researchers from the University of Leuven (@vanhoefm and team) have discovered flaws in WPA2 implementation in clients and APs. These flaws create vulnerabilities for replay and decryption attacks on packets transferred over WiFi links. They have named them KRACKs (Key Reinstallation AttaCKs). Both 802.1x (EAP) and PSK (password) based networks are affected. These vulnerabilities have been cataloged under 10 CVEs. In the series of videos below, I explain these CVEs in detail with Vivek Ramachandran, Founder and CEO of Pentester Academy.

Posts by Topic

see all
free-on-demand-webinars.png
Accton heralds the future as they open networking standards for WiFi
Posted by Freddy Mangum on Mar 9, 2016

Since launching in 2003, we’ve been committed to advancing innovation and integrity in the digital age. We take pride in creating — and constantly improving upon — cloud-managed WiFi that can meet the world’s increasing demand for seamless connectivity. We recognize that the industry has many hurdles to overcome, and as such are always excited to see fellow tech visionaries sharing our values and goals — enterprises that are focused on the present and the future needs of an increasingly cloud-first world.