KRACK : Critical Key Reinstallation Attack Against Widely-Used WPA2 Wi-Fi Protocol

Add caption
Do you remember your wireless network is secure because you’re using WPA2 encryption?
If yes, think again!

Security researchers have found few key management vulnerabilities in the core of WI-FI Protected Access II (WPA2) rules that could allow an attacker to hack into your WI-FI network and monitor on the Internet communications.

WPA2 is a 13-year-old WiFI authentication scheme widely used to secure WiFI connections, but the standard has been compromised, impacting almost all WI-FI devices—adding in our places and businesses, along with the networking groups that build them.

Named KRACK—Key Re-installation Attack—the proof-of-concept attack demonstrated by a team of researchers works against all modern protected WI-FI systems and can do abused to steal sensitive information like credit card numbers, passwords, chat messages, emails, and photos.

Since the gaps continue in the WI-FI rule itself, and not in the implementations or any individual product, any suitable implementation of WPA2 is right affected.

According to the researchers, the newly found attack works against:

Both WPA1 furthermore WPA2,
Personal and enterprise networks,
Ciphers WPA-TKIP, AES-CCMP, and GCMP
In short, if your device helps WiFI, it is most likely affected. During their initial analysis, the researchers discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, plus others, are all influenced by the KRACK attacks.

It should be noted that the KRACK attack does not support attackers recover the targeted WiFI’s password; instead, it allows them to decrypt WiFI users’ data without telling or knowing the actual password.
So merely replacing your Wi-FI custom key does not prevent (or mitigate) KRACK attack.

Here’s Whence the KRACK WPA2 Attack Work








https://youtu.be/Oh4WURZoR98