No more wi-fi networks are considering secure

in #hacking8 years ago

Hello Steemit Community!

Yesterday the hacking community received news about a group of researchers that broke the most secure Wifi encryption know as WPA2.
After WEP was cracked a few years ago with the poor encryption people started using WPA and WPS but once again with the pixie dust attack was possible to get the pin code and connect to the network so people that want to secure their wifi network use WPA2 with WPS disabled, now nothing is secure.

Security researchers have discovered several key management vulnerabilities in the core of Wi-Fi Protected Access II (WPA2) protocol that could allow an attacker to hack into your Wi-Fi network and eavesdrop on the Internet communications.

Dubbed KRACK—Key Reinstallation Attack—the proof-of-concept attack demonstrated by a team of researchers works against all modern protected Wi-Fi networks and can be abused to steal sensitive information like credit card numbers, passwords, chat messages, emails, and photos.

Since the weaknesses reside in the Wi-Fi standard itself, and not in the implementations or any individual product, any correct implementation of WPA2 is likely affected.
According to the researchers, the newly discovered attack works against:

  • Both WPA1 and WPA2
  • Personal and enterprise networks
  • Ciphers WPA-TKIP, AES-CCMP, and GCMP

In short, if your device supports WiFi, it is most likely affected. During their initial research, the researchers discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by the KRACK attacks.

The key management vulnerabilities in the WPA2 protocol discovered by the researchers has been tracked as:

  • CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the four-way handshake.
  • CVE-2017-13078: Reinstallation of the group key (GTK) in the four-way handshake.
  • CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the four-way handshake.
  • CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake.
  • CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake.
  • CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it.
  • CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake.
  • CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake.
  • CVE-2017-13087: reinstallation of the group key (GTK) while processing a Wireless Network Management (WNM) Sleep Mode Response frame.
  • CVE-2017-13088: reinstallation of the integrity group key (IGTK) while processing a Wireless Network Management (WNM) Sleep Mode Response frame.


  • Here is the full details about this project KrackAttacks

    News Source

    One advice to protect from this attack until new updates are released is to use a VPN, where your connection is encrypted and secure.

    Follow me on Twitter @johnycrypto

    If you like this post or have something to say or ask, please upvote, follow and comment :D

    Coin Marketplace

    STEEM 0.10
    TRX 0.31
    JST 0.032
    BTC 110729.03
    ETH 3944.87
    USDT 1.00
    SBD 0.63