Key reinstallation attacks forced nonce reuse in wpa2 là gì

Không rủi ro. Đảm bảo hoàn tiền trong 30 ngày

Bao gồmMiễn phí 500 GB dung lượng lưu trữ đám mây từ pCloud (biyearly)

Tất cả số tiền được hiển thị bằng AUD và mọi chiết khấu đều dựa trên mức giá dịch vụ hàng tháng hiện tại là $13.99 mỗi tháng

"Private Internet Access hoạt động vượt trội và nhiều tính năng hơn đối thủ" -
Key reinstallation attacks forced nonce reuse in wpa2 là gì

Tính năng VPN

Chặn quảng cáo, trình theo dõi và phần mềm độc hại

Băng thông không giới hạn

Không có nhật ký lưu lượng

Target | Walmart | Best Buy | và 71 thương hiệu khác

Mã hóa tất cả lưu lượng truy cập Internet

của bạn và sử dụng một IP được bảo vệ an toàn.

Bảo vệ danh tính của bạn bằng

IP VPN ẩn danh.

Sử dụng PIA để hòa vào

đám đông.

Mã hóa giúp bạn giữ an toàn,

ngay cả khi dùng Wi-Fi công cộng.

Vĩnh biệt các hạn chế

địa lý. Thoải mái đi du lịch với PIA.

Truy cập Internet hoàn toàn

không bị kiểm duyệt. Cuối cùng cũng thành sự thật.

As you might know WPA – the encryption protocol that was brought in place of the earlier WEP (Basically useless) was proven mathematically to be secured that it couldn’t be penetrated for the last 15 years or so, but until last Monday – 16th of October 2017. Two researchers Mathy Vanhoef and Frank Piessens of the Belgian University – University of Leuven, released information of an exploit they found on a security mechanism on all major wifi connections these days.

Their paper “Key Reinstallation AttaCKs: Forcing Nonce Reuse in WPA2″ will be formally presented on November 1st at the ACM Conference on Computer and Communications Security.

The vulnerability, called KRACK (Key Reinstallation AttaCK), is found within the 4-way handshake process which takes place when a device attempts to connect to a wireless network.

So let’s try to simply understand the nature of this attack.

When you connect to wi-fi your device and the router exchange some information. This is what we call a handshake.

Part of the handshake checks that you have the right password to join the wi-fi network. Then the two devices negotiate a session key so that any further information sent between them is encrypted. This is the part where the attack happens.

Vanhoef and Piessens found that part of the handshake can be captured by attackers and then rebroadcast. If a victim’s device accepts the rebroadcast message it will reset some of the values used in the encryption process which will make easier for an attacker to unscramble data being sent over the wi-fi network and read it.

On the other hand it could lead an attacker to mimic your router so everything you send and receive goes through their equipment and not yours.

The attack cannot be carried out remotely, an attacker would have to be in range of a Wi-Fi network to carry it out. On top of that the attack is unlikely to affect the security of information sent over the network that is protected in addition to the standard WPA2 encryption. This means connections to secure websites (that use HTTPS and HSTS) are still safe, as are other encrypted connections such as virtual private networks (VPN) and SSH communications.

On October 16th, 2017, a research paper with the title of “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2” was made publicly available.

This paper discusses seven vulnerabilities affecting session key negotiation in both the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key, or an integrity key on either a wireless client or a wireless access point. Additional research also led to the discovery of three additional vulnerabilities (not discussed in the original paper) affecting wireless supplicant supporting either the 802.11z (Extensions to Direct-Link Setup) standard or the 802.11v (Wireless Network Management) standard.

Key reinstallation attacks forced nonce reuse in wpa2 là gì

The three additional vulnerabilities could also allow the reinstallation of a pairwise key, group key, or integrity group key.

An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on.

The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available.