New KRACK Attack Breaks WPA2 WiFi Protocol

KRACK allows an attacker to carry out a MitM and force network participants to reinstall the encryption key used to protected WPA2 traffic. The attack also doesn’t recover WiFi passwords.The attack works only if the attacker is in the victim’s WiFi network range, and is not something that could be carried out via the Internet.

HTTPS may also protect user traffic in some cases, as HTTPS uses its own separate encryption layer. Nonetheless, HTTPS is not 100% secure, as attacks exist that could downgrade the connection and grant the attacker access to HTTPS encrypted traffic [123456].The KRACK attack is universal and works against all type of devices connecting or using a WPA2 WiFi network. This includes Android, Linux, iOS, macOS, Windows, OpenBSD, and embedded and IoT devices.

Because the vulnerability in establishing the WPA2 handshake affects the protocol itself, even devices with a perfect protocol implementation are affected.Changing WiFi passwords doesn’t protect users. Users must install firmware updates for affected products.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *