Conference logo

KRACKing WPA2 by Forcing Nonce Reuse - Mathy Vanhoef

34c3 - Security - 12/27/2017

We introduce key reinstallation attacks (KRACKs). These attacks abuse features of a protocol to reinstall an already in-use key, thereby resetting nonces and/or replay counters associated to this key. We show that our novel attack technique breaks several handshakes that are used in a WPA2-protected network.

Share this talk:
https://c3stream.de/Info?guid=ff24373e-ebe2-4077-9db0-eae5ab003538