Search
WPA2 Key Reinstallation Vulnerabilities (KRACK) Explained
Posted by Hemant Chaskar on Oct 16, 2017
WPA2 Vulnerability.png

Researchers from the University of Leuven (@vanhoefm and team) have discovered flaws in WPA2 implementation in clients and APs. These flaws create vulnerabilities for replay and decryption attacks on packets transferred over WiFi links. They have named them KRACKs (Key Reinstallation AttaCKs). Both 802.1x (EAP) and PSK (password) based networks are affected. These vulnerabilities have been cataloged under 10 CVEs. In the series of videos below, I explain these CVEs in detail with Vivek Ramachandran, Founder and CEO of Pentester Academy.

Posts by Topic

see all
free-on-demand-webinars.png
load-balancing-1.png
Smart Client Load Balancing
Posted by Robert Ferruolo (Dr. RF) on Aug 16, 2016

Wireless Is Great, Except When It Isn’t

One of the challenges of WiFi is that clients are notoriously self-interested and use a very rudimentary decision-making process to determine which access point to connect to. This decision is simply based on AP signal strength or signal-to-noise ratio (SNR). The IEEE 802.11k standard is designed to help the clients make better, more informed roaming decisions, but to date very few clients have implemented it.