Search
WPA2 Key Reinstallation Vulnerabilities (KRACK) Explained
Posted by Hemant Chaskar on Oct 16, 2017
WPA2 Vulnerability.png

Researchers from the University of Leuven (@vanhoefm and team) have discovered flaws in WPA2 implementation in clients and APs. These flaws create vulnerabilities for replay and decryption attacks on packets transferred over WiFi links. They have named them KRACKs (Key Reinstallation AttaCKs). Both 802.1x (EAP) and PSK (password) based networks are affected. These vulnerabilities have been cataloged under 10 CVEs. In the series of videos below, I explain these CVEs in detail with Vivek Ramachandran, Founder and CEO of Pentester Academy.

Posts by Topic

see all
free-on-demand-webinars.png
Like Peanut Butter and Chocolate… Performance and Rogue Detection is Always Better Together
Posted by Sean Blanton on Nov 18, 2016

We all know performance testing is as important a task as any in the WiFi business. We need to know the limits of our access points after all, and it certainly helps you to have all the information at hand to make the most informed decision you can. But performance testing focused soley on speed? Well, while it's important, it doesn't give you all the information you need. Because you, dear reader, are not just upgrading your WiFi for speed. You want all the bells and whistles that come standard with enterprise WiFi platforms today. And you want to turn them all on. And most importantly, you want to know if and how they affect speed.