Search
WPA2 Key Reinstallation Vulnerabilities (KRACK) Explained
Posted by Hemant Chaskar on Oct 16, 2017
WPA2 Vulnerability.png

Researchers from the University of Leuven (@vanhoefm and team) have discovered flaws in WPA2 implementation in clients and APs. These flaws create vulnerabilities for replay and decryption attacks on packets transferred over WiFi links. They have named them KRACKs (Key Reinstallation AttaCKs). Both 802.1x (EAP) and PSK (password) based networks are affected. These vulnerabilities have been cataloged under 10 CVEs. In the series of videos below, I explain these CVEs in detail with Vivek Ramachandran, Founder and CEO of Pentester Academy.

Posts by Topic

see all
free-on-demand-webinars.png
802.11ax: Optimistic CSMA for Efficient Channel Reuse in WiFi
Posted by Hemant Chaskar on Jul 9, 2016

802.11ax is the new 802.11 standard currently in the making. Unlike earlier 802.11 standards that mainly focused on increasing raw link speeds, the design objective now is to increase airtime efficiency. One feature it introduces is OFDMA (Orthogonal Frequency-Division Multiple Access) to address the airtime inefficiency caused by short WiFi frames. The other is dynamic sensitivity control, which modifies traditional CSMA (Carrier Sense Multiple Access) to address airtime inefficiency caused by co-channel interference during channel reuse.