- Get link
- X
- Other Apps

This Sunday revealed a high degree of vulnerability in the protocol Wi-Fi Protected Access II, the same WPA2, which is used by most users of the wireless network. Vulnerability allows hackers to intercept Wi-Fi traffic between computers and access points. Attack KRACK allows for other mucks, including capture of the connection and malicious injections.
The KRACK exploit, abbreviated as Key Reinstallation Attack, became known as part of a carefully classified study as a result of coordinated disclosure scheduled for 8 am Monday to the time of the east coast. The US Advisory Council CERT, compiled from hundreds of organizations, described the study as follows:
"US-CERT learned about several key vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol, which operates on the principle of four-way handshake. The consequences of using these vulnerabilities include decryption, interception of packets, capture of a TCP connection, injection of HTTP content, and more. Keep in mind that problems at the protocol level will affect most of the correct implementations of this standard. CERT / CC and researcher KU Laven will publicly disclose these vulnerabilities on October 16, 2017 ".
How does the vulnerability work? WPA2 uses a four-way handshake, which creates a traffic encryption key. During the third step, you can re-send the key several times. When resending in a certain way, you can completely undermine encryption.
It is unlikely that most access points can be patched up quickly enough, and some of them will remain without treatment. If the WPA2 encryption bypass exploits are really simple and reliable, hackers will be able to listen to nearby Wi-Fi traffic.
In a good way, we need to avoid using Wi-Fi until a patch is delivered. Until then, you will have to use HTTPS, STARTTLS, Secure Shell and other reliable protocols to encrypt traffic on the Web and email. Also, you will need to carefully choose the providers of VPN.
The article is based on materials .
- Get link
- X
- Other Apps
Comments
Post a Comment