Wi-Fi Key Reinstallation Attacks

21 June 2021 by Phillip Johnston • Last updated 14 October 2021A serious flaw in the WPA2 security algorithm which protects our Wifi networks was announced in October 2017. The attack vector is dubbed KRACK for “Key Reinstallation Attack.” The KRACK vector exploits a flaw in the WPA2 algorithm itself. Any correct implementation was likely to be affected. By exploiting the 4-away handshake protocol used to exchange encryption keys, a third-party can collect and replay the key installation message. This vulnerability enabled packet replays, packet forgery, packet decryption, or man-in-the-middle attacks. Defenses against KRACK were put into place and proven …

To access this content, you must purchase a Membership - check out the different options here. If you're a member, log in.