SlideShare a Scribd company logo
1 of 13
Download to read offline
Kracking WPA2 –
Investigation and
Further
Implications
BY MATTHEW BUTLER
Overview of Content:
WEP and
WPA2
1
What is
KRACK?
2
Low-
Operation
3
High-
Operation
4
List of
vulnerabilities
5
Summary
6
Implications
and
Conclusions
7
Self-Run Tests
8
Bibliography
9
Q&A
10
WEP and WPA2
WEP – RC4 Encyrption
Keystream[1]
RSNA Key Hierarchy [2]
 Wired Equivalency
Protocol 802.11-1997.
 76% London Firms in 2006
still used WEP. Performance
vs Safety [1].
 Wi-Fi Protected Access 2
802.11i-2004.
 Introduced two new
protocols, 4-way
handshake (4WH) and
Group Key Handshake
(GKH).
Header Replay counter Nonce RSC MIC Key Data
Example EAPOL Frame
What is KRACK?
Key Re-installation AttaCK
 Discovered by Mathy Vanhoef and presented at Computer and
Communications Security Conference (CCS) on November 1st 2017.
[3]
 Man-in-the-middle-attack (MitM)
 “Most significant flaw to have been discovered in years” [4, 5]
 All WPA2 networks and devices vulnerable
 Attacks the fundamental aspects of WPA2 security.
 Several vendors have released patches, others are in development
[6].
 In response, WPA3 has been announced (As of January 13th 2018)
[7].
Low-Level
Operation
 **Requires proximity
 A rogue access point (AP) is
established.
 Mimics a legitimate, known AP
and forces clients to connect to
it.
 Intercepts traffic between the
victim and end-destination.
 Further enhanced by utilising
other tools, such as an SSL
stripper to remove HTTPS.
MitM example [8]
KRACK against GKH
message-1 [3]
 4WH relies on the wpa_supplicant (SSM)
and re-transmitting message-3 (NGT-PHS).
 Blocks transmission of message-4 (INT-PHS).
Resets Nonce.
 **Windows and iOS does not allow re-
transmission of message-3 due to
implementation of SSM.
 GKH is used instead.
 GKH duplicates the targeted AP on a
separate channel, to force the supplicant
to connect.
 GKH issues a new message-1 with an
incremented replay counter.
 GKH can work autonomously, due to SSID
interference.
High-Level Operation
Vulnerabilities
CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake.
CVE-2017-13078: Reinstallation of the group key (GTK) in the 4-way handshake.
CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way handshake.
CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake.
CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake.
CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it.
CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake.
CVE-2017-13086: Reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake.
CVE-2017-13087: Reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.
CVE-2017-13088: Reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame)
Summary
 Interception of **encrypted traffic
 Forging of packets, bi-directionally.
 Paves way towards additional, directed
attacks.
Implications and Conclusions
Public Security
• Users don’t understand
security concerns [9].
• Malicious Access Points
• Viewable HTTP POST and
REQUEST data (blind-eye)
• Public Wi-Fi hotspots,
Universities and Enterprises
at risk of exploit.
BYOD – Mobile Ecosystems
• Two thirds of employers allow
employees to connect
personal devices to
corporate networks [10].
• Vetted, loaned devices !=
Secure
• New Security Policies
• Android is heavily
fragmented, 13.5% on latest
software.
• Only certain devices
guaranteed to receive
patches.
• **Android Treble may fix this.
Conclusions
• KRACK was discovered on
accident.
• Every Wi-FI Device
Vulnerable.
• Both Client and AP need
patches.
• Tools will be made available
online.
• Further attacks?
Bibliography
 [1] A. Bittau, M. Handley, and J. Lackey, “The final nail in weps coffin,”in 27th IEEE Symposium on Security and Privacy, pp. 386–400.
 [2] L. Butti and J. Tinnes, “Discovering and exploiting 802.11 wireless driver vulnerabilities,” Journal in Computer Virology, vol. 4, no. 1, pp.
25–37, 2008.
 [3] M. Vanhoef and F. Piessens, “Key reinstallation attacks: Forcing nonce reuse in wpa2,” in Proceedings of the ACM Conference on
Computer and Communications Security, Dallas, TX, USA, vol. 30, 2017.
 [4] R. McMillan, “Significant flaw discovered in wi-fi security protocol,” The Wall street Journal, Oct 2017. [Online]. Available:
https://www.wsj.com/art
 [5] L. Eadicicco, “Krack attack: Everything to know about the wpa2 wi-fi flaw,” Time, Oct 2017. [Online]. Available:
http://time.com/4983720/krack-attack-wpa2-wifi/
 [6] C. Osborne and Z. Whittaker, "Here's every patch for KRACK Wi-Fi vulnerability available right now", ZDNet, 2018. [Online]. Available:
http://www.zdnet.com/article/here-is-every-patch-for-krack-wi-fi-attack-available-right-now/. [Accessed: 15- Jan- 2018].
 [7] T. Ong, "Wi-Fi Alliance announces new WPA3 security protections", Theverge.com, 2018. [Online]. Available:
https://www.theverge.com/2018/1/9/16867940/wi-fi-alliance-new-wpa3-security-protections-wpa2-announced. [Accessed: 15- Jan-
2018].
 [8] F. Callegati, W. Cerroni, and M. Ramilli, “Man-in-the-middle attack to the https protocol,” IEEE Security & Privacy, vol. 7, no. 1, pp. 78–
81, 2009.
 [9] P. Klasnja, S. Consolvo, J. Jung, B. M. Greenstein, L. LeGrand, P. Powledge, and D. Wetherall, “When i am on wi-fi, i am fearless:
privacy concerns & practices in everyday wi-fi use,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.
ACM,2009, pp. 1993–2002.
 [10] K. W. Miller, J. Voas, and G. F. Hurlburt, “Byod: Security and privacy considerations,” IT Professional, vol. 14, no. 5, pp. 53–55, ept 2012.
Q&A
Thanks for listening!

More Related Content

What's hot

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
Fábio Afonso
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 

What's hot (20)

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Aircrack
AircrackAircrack
Aircrack
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network Security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
WEP
WEPWEP
WEP
 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
 
Network security
Network securityNetwork security
Network security
 

Similar to Kracking WPA2

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Wireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareWireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security Software
BRNSSPublicationHubI
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
CSCJournals
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
pijans
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
mark scott
 

Similar to Kracking WPA2 (20)

Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Pdf3
Pdf3Pdf3
Pdf3
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
 
Wireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareWireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security Software
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
lecture_5.pptx
lecture_5.pptxlecture_5.pptx
lecture_5.pptx
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...Using Tetration for application security and policy enforcement in multi-vend...
Using Tetration for application security and policy enforcement in multi-vend...
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Y36146148
Y36146148Y36146148
Y36146148
 

Recently uploaded

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Recently uploaded (15)

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 

Kracking WPA2

  • 1. Kracking WPA2 – Investigation and Further Implications BY MATTHEW BUTLER
  • 2. Overview of Content: WEP and WPA2 1 What is KRACK? 2 Low- Operation 3 High- Operation 4 List of vulnerabilities 5 Summary 6 Implications and Conclusions 7 Self-Run Tests 8 Bibliography 9 Q&A 10
  • 3. WEP and WPA2 WEP – RC4 Encyrption Keystream[1] RSNA Key Hierarchy [2]  Wired Equivalency Protocol 802.11-1997.  76% London Firms in 2006 still used WEP. Performance vs Safety [1].  Wi-Fi Protected Access 2 802.11i-2004.  Introduced two new protocols, 4-way handshake (4WH) and Group Key Handshake (GKH). Header Replay counter Nonce RSC MIC Key Data Example EAPOL Frame
  • 4. What is KRACK? Key Re-installation AttaCK  Discovered by Mathy Vanhoef and presented at Computer and Communications Security Conference (CCS) on November 1st 2017. [3]  Man-in-the-middle-attack (MitM)  “Most significant flaw to have been discovered in years” [4, 5]  All WPA2 networks and devices vulnerable  Attacks the fundamental aspects of WPA2 security.  Several vendors have released patches, others are in development [6].  In response, WPA3 has been announced (As of January 13th 2018) [7].
  • 5. Low-Level Operation  **Requires proximity  A rogue access point (AP) is established.  Mimics a legitimate, known AP and forces clients to connect to it.  Intercepts traffic between the victim and end-destination.  Further enhanced by utilising other tools, such as an SSL stripper to remove HTTPS. MitM example [8]
  • 6. KRACK against GKH message-1 [3]  4WH relies on the wpa_supplicant (SSM) and re-transmitting message-3 (NGT-PHS).  Blocks transmission of message-4 (INT-PHS). Resets Nonce.  **Windows and iOS does not allow re- transmission of message-3 due to implementation of SSM.  GKH is used instead.  GKH duplicates the targeted AP on a separate channel, to force the supplicant to connect.  GKH issues a new message-1 with an incremented replay counter.  GKH can work autonomously, due to SSID interference. High-Level Operation
  • 7. Vulnerabilities CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake. CVE-2017-13078: Reinstallation of the group key (GTK) in the 4-way handshake. CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way handshake. CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake. CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. CVE-2017-13086: Reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake. CVE-2017-13087: Reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame. CVE-2017-13088: Reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame)
  • 8. Summary  Interception of **encrypted traffic  Forging of packets, bi-directionally.  Paves way towards additional, directed attacks.
  • 9. Implications and Conclusions Public Security • Users don’t understand security concerns [9]. • Malicious Access Points • Viewable HTTP POST and REQUEST data (blind-eye) • Public Wi-Fi hotspots, Universities and Enterprises at risk of exploit. BYOD – Mobile Ecosystems • Two thirds of employers allow employees to connect personal devices to corporate networks [10]. • Vetted, loaned devices != Secure • New Security Policies • Android is heavily fragmented, 13.5% on latest software. • Only certain devices guaranteed to receive patches. • **Android Treble may fix this. Conclusions • KRACK was discovered on accident. • Every Wi-FI Device Vulnerable. • Both Client and AP need patches. • Tools will be made available online. • Further attacks?
  • 10.
  • 11.
  • 12. Bibliography  [1] A. Bittau, M. Handley, and J. Lackey, “The final nail in weps coffin,”in 27th IEEE Symposium on Security and Privacy, pp. 386–400.  [2] L. Butti and J. Tinnes, “Discovering and exploiting 802.11 wireless driver vulnerabilities,” Journal in Computer Virology, vol. 4, no. 1, pp. 25–37, 2008.  [3] M. Vanhoef and F. Piessens, “Key reinstallation attacks: Forcing nonce reuse in wpa2,” in Proceedings of the ACM Conference on Computer and Communications Security, Dallas, TX, USA, vol. 30, 2017.  [4] R. McMillan, “Significant flaw discovered in wi-fi security protocol,” The Wall street Journal, Oct 2017. [Online]. Available: https://www.wsj.com/art  [5] L. Eadicicco, “Krack attack: Everything to know about the wpa2 wi-fi flaw,” Time, Oct 2017. [Online]. Available: http://time.com/4983720/krack-attack-wpa2-wifi/  [6] C. Osborne and Z. Whittaker, "Here's every patch for KRACK Wi-Fi vulnerability available right now", ZDNet, 2018. [Online]. Available: http://www.zdnet.com/article/here-is-every-patch-for-krack-wi-fi-attack-available-right-now/. [Accessed: 15- Jan- 2018].  [7] T. Ong, "Wi-Fi Alliance announces new WPA3 security protections", Theverge.com, 2018. [Online]. Available: https://www.theverge.com/2018/1/9/16867940/wi-fi-alliance-new-wpa3-security-protections-wpa2-announced. [Accessed: 15- Jan- 2018].  [8] F. Callegati, W. Cerroni, and M. Ramilli, “Man-in-the-middle attack to the https protocol,” IEEE Security & Privacy, vol. 7, no. 1, pp. 78– 81, 2009.  [9] P. Klasnja, S. Consolvo, J. Jung, B. M. Greenstein, L. LeGrand, P. Powledge, and D. Wetherall, “When i am on wi-fi, i am fearless: privacy concerns & practices in everyday wi-fi use,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM,2009, pp. 1993–2002.  [10] K. W. Miller, J. Voas, and G. F. Hurlburt, “Byod: Security and privacy considerations,” IT Professional, vol. 14, no. 5, pp. 53–55, ept 2012.