digip Posted October 16, 2017 Share Posted October 16, 2017 WPA2 is bypassed with MITM attack against Linux and Android devices. Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted October 16, 2017 Share Posted October 16, 2017 Some good reading http://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack/ https://www.blackhat.com/docs/webcast/08242017-securely-implementing-network2.pdf https://github.com/vanhoefm/blackhat17-pocs Quote Link to comment Share on other sites More sharing options...
digip Posted October 16, 2017 Author Share Posted October 16, 2017 https://www.krackattacks.com/ Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted October 16, 2017 Share Posted October 16, 2017 5 minutes ago, digip said: https://www.krackattacks.com/ Even better! thanks for sharing Quote Link to comment Share on other sites More sharing options...
UnLo Posted October 16, 2017 Share Posted October 16, 2017 I was wondering while reading this morning if anyone here had posted yet. You don't disappoint! Quote Link to comment Share on other sites More sharing options...
Michael Weinstein Posted October 16, 2017 Share Posted October 16, 2017 Sample code! https://pastebin.com/aZyyS16w Quote Link to comment Share on other sites More sharing options...
Zylla Posted October 17, 2017 Share Posted October 17, 2017 Awesome! Quote Link to comment Share on other sites More sharing options...
LivingDodo Posted October 17, 2017 Share Posted October 17, 2017 Waiting to see this on the Hak5 devices :) Quote Link to comment Share on other sites More sharing options...
Rkiver Posted October 17, 2017 Share Posted October 17, 2017 I know Seb said he is looking into it, and Patrick mentioned it on DTNS yesterday too. I am looking forward to seeing what comes now in new firmwares. Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted October 18, 2017 Share Posted October 18, 2017 Really nice break down of the mechanics of the attack. This guy is great to watch anyway. Quote Link to comment Share on other sites More sharing options...
PoSHMagiC0de Posted October 18, 2017 Share Posted October 18, 2017 I like LiveOverflow's videos too. His videos are the ones to watch if you want to get into the binary side of things. Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted October 19, 2017 Share Posted October 19, 2017 (edited) AP vuln test script released - as it was already leaked. https://github.com/vanhoefm/krackattacks-test-ap-ft [10:41:56] AP transmitted data using IV=1 (seq=3757) [10:41:56] AP transmitted data using IV=1 (seq=3757) [10:41:56] IV reuse detected (IV=1, seq=3757). AP is vulnerable! [10:41:56] AP transmitted data using IV=2 (seq=3772) My main router is vulnerable :( Edited October 19, 2017 by Just_a_User Quote Link to comment Share on other sites More sharing options...
connorboucher Posted October 27, 2017 Share Posted October 27, 2017 WPA3 Confirmed? (I hope not ;-;) Quote Link to comment Share on other sites More sharing options...
digip Posted October 30, 2017 Author Share Posted October 30, 2017 On 10/27/2017 at 5:25 PM, connorboucher said: WPA3 Confirmed? (I hope not ;-;) WPA3 is not even a thing yet. There is no new standard, as far as I know, that supersedes WPA2 and WPA2 Enterprise. Quote Link to comment Share on other sites More sharing options...
Dave-ee Jones Posted October 30, 2017 Share Posted October 30, 2017 13 hours ago, digip said: WPA3 is not even a thing yet. There is no new standard, as far as I know, that supersedes WPA2 and WPA2 Enterprise. Correct-a-mundo. I think it's a near-top-priority right now for WiFi Security engineers, but as to when there will be a superseding security method..I know not. Could be that they ditch passwords altogether and use a certificate-like authentication, but that means it needs to be secure against certificate spoofing. Quote Link to comment Share on other sites More sharing options...
digip Posted October 31, 2017 Author Share Posted October 31, 2017 16 hours ago, Dave-ee Jones said: Correct-a-mundo. I think it's a near-top-priority right now for WiFi Security engineers, but as to when there will be a superseding security method..I know not. Could be that they ditch passwords altogether and use a certificate-like authentication, but that means it needs to be secure against certificate spoofing. How do you issue certs to each device, and what devices will inherently be able to support it in this manner. This being the age of TV's, game consoles and DVD players all being WPA2 compliant now, I think you would ultimately kill a huge trunk of the user base, if you suddenly go to a new standard, vs patching the existing model to keep legacy devices working. Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted November 6, 2017 Share Posted November 6, 2017 Interesting https://github.com/kukulo2011/Openwrt_CC_Krack_wpad-mini Quote Link to comment Share on other sites More sharing options...
digip Posted November 6, 2017 Author Share Posted November 6, 2017 26 minutes ago, Just_a_User said: Interesting https://github.com/kukulo2011/Openwrt_CC_Krack_wpad-mini I'd suggest getting patches from official sources, but that's just me. Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted November 6, 2017 Share Posted November 6, 2017 (edited) 13 minutes ago, digip said: I'd suggest getting patches from official sources, but that's just me. Are there official ones released? I prob missed them Edited November 6, 2017 by Just_a_User Quote Link to comment Share on other sites More sharing options...
digip Posted November 7, 2017 Author Share Posted November 7, 2017 (edited) OpenWRT is an alternative to most linksys devices. What is the device it goes on, the manufacturer? Either that, or go to the OpenWRT site, get official 3rd party firmware, which I'm sure at some point, the OpenWRT community will patch. Unless the git repo is one of the developers for OpenWRT(I don't know them), then I would probably avoid randomly found patches. I mean, it could be legit patched, but I'm a bit more cautious when it comes to some things. Especially when I don't see the code used in them, although you could unzip all the way down to the IPK and unzip them as well, I wouldn't know where to look specifically for changes that fix this issue. They apparently have their own GIT repo as well - http://git.openwrt.org/?p=15.05/openwrt.git;a=commit;h=acfb6c2181b1589e5b2d0d121180bcc7d62d37d4 Edited November 7, 2017 by digip Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted November 7, 2017 Share Posted November 7, 2017 OK cool, thanks Quote Link to comment Share on other sites More sharing options...
kukulo Posted November 9, 2017 Share Posted November 9, 2017 I added the code reference for the wpad-mini package on github. https://github.com/kukulo2011/Openwrt_CC_Krack_wpad-mini If you are too afraid to install, you can still build a single package according to Openwrt wiki or wait for an official update. The build of the wpad-mini took me around 1 hour on core i5 running ubuntu. Pushing and updating the router took 5 mins. Quote Link to comment Share on other sites More sharing options...
Just_a_User Posted December 13, 2017 Share Posted December 13, 2017 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.