Site icon QUE.com

WPA2 Vulnerability Key Reinstallation Attacks or KRACKS – All WPA2 wireless networking may be affected.

CERT Coordination Center (CERT/CC) has released information on Wi-Fi Protected Access II (WPA2) protocol vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. The vulnerabilities are in the WPA2 protocol, not within individual WPA2 implementations, which means that all WPA2 wireless networking may be affected. Source: Vulnerability Note VU#228519

It is a vulnerability attacking all modern Wireless Access Point that use WPA2 protocol to exploit clients connected on the wireless network. Exploiting this vulnerability requires the following:

As you can see, the actions must be completed by someone who know how to initiate the attack. It is not designed for script kiddies.

To prevent this vulnerability, we must update all wireless devices. There is no available security patch posted on their website. I will check our vendor wireless device from time to time.

Watch the Demonstration.

Source: https://www.krackattacks.com/

Related: In 2002-2003, the WirelessCon Team (I am one of the member) actually won the first wardriving contest event in BlackHat Defcon. Then, 2nd place the following year. The contest is to find as many as unsecure Wireless Access Point (WAP) for a period of time using a DIY WI-FI antenna and Kismet Wireless or Netstumbler tool. Source: Wardrive.com or WirelessCon.com.

Alternative Solutions to secure your Wireless Network:

  1. Check with your Wireless device vendor’s website for security update.
  2. Check with your cable service provider on how to fix/secure your wireless network.
  3. A bit technical is to reconfigure your wireless access point (WAP) to only accept registered device to the network. This is a manual process to add the client wireless device (MAC address) to the WAP.

For PUBLIC Wireless Network. For example, shopping mall they offer free wireless access, coffee shop, dentist, etc.
I recommend that you limit your connection to these public WIFI, unless you trust their network.

Update: BleepingComputer.com provided list of vendors with their updates to secure devices against WPA2 Vulnerability Key Reinstallation Attacks or KRACKS

Image by OpenClipart-Vectors pixabay

Exit mobile version