
KRACKing WPA2 by Forcing Nonce Reuse - Mathy Vanhoef
34c3 - Security - 12/27/2017
We introduce key reinstallation attacks (KRACKs). These attacks abuse features of a protocol to reinstall an already in-use key, thereby resetting nonces and/or replay counters associated to this key. We show that our novel attack technique breaks several handshakes that are used in a WPA2-protected network.
Share this talk:https://c3stream.de/Info?guid=ff24373e-ebe2-4077-9db0-eae5ab003538