PDA

View Full Version : Kracks a new WPA2 exploit



mmusket33
2017-11-06, 11:56
MTeams is studying this new Kracks Exploit for WPA2

See https://www.infopackets.com/news/10205/new-wi-fi-crack-can-intercept-your-data-what-you-need-know

For a how to search

How to use Krack Vulnerability CVE 2017-13082 I Kali Linux 2017.2

Musket Teams

grid
2017-11-06, 12:28
Appreciate the link to additional information.

My view is that, while this is a problem, I feel it's been over-hyped. Rogue/evil twin access points are more dangerous.

_defalt
2017-11-06, 13:42
I feel it's been over-hyped
Yeah I said the same thing in stack exchange Information Security site. KRACK vulnerability was overhyped but not because WPA/WPA2 had this weakness. It is because it was spotted after 14 years when WPA/WPA2 was accepted as a standard by IEEE without checking this "key sent twice condition".

This vulnerability has a very small attack vector so KRACK is not going to be widely used by pentesters. However, a social engineering attack may use this exploit. An attacker can easily redirect the victim's http traffic to his fake "router firmware update" webpage and can ask the victim to enter Pre-shared key to initialize the fake router update so everyone should update their firmware.

KRACK vulnerability is already discussed in CCS 2017 conference (https://www.sigsac.org/ccs/CCS2017/papers.html) but the author didn't release the attacking script until the world is patched. But i think people are still making KRACK tools on github.

grid
2017-11-07, 12:46
Agreed, _defalt. As the researcher mentioned on his site, the problem is in the WPA/WPA2 protocol...a replay issue. I can certainly see the effectiveness of the social engineering attack you described.

I've been watching github & other places for KRACK tools as well. Might even take a crack (pun intended :) ) at writing such a tool myself.

bidi
2017-11-10, 10:35
I wonder if KRACK could be used for bandwidth leeching?

It would work like a side tap to the connection of the authenticated WPA2 client.

1) Use KRACK to get a MITM position.
2) Inject packets with requests.
3) Intercept responses.

Someone could eventually even wrap those tasks to look like a 127.0.0.1 socks proxy or vpn for anonymous browsing or file transfers.

_defalt
2017-11-11, 02:36
I wonder if KRACK could be used for bandwidth leeching?

It would work like a side tap to the connection of the authenticated WPA2 client.

1) Use KRACK to get a MITM position.
2) Inject packets with requests.
3) Intercept responses.

Someone could eventually even wrap those tasks to look like a 127.0.0.1 socks proxy or vpn for anonymous browsing or file transfers.
1)KRACK itself requires MITM to work.
2)In WPA2/CCMP you can't tamper with the data because they are authenticated using CBC-MAC.
3)Interception is possible once you decipher the traffic by initiating KRACK.

Dagramis
2017-11-20, 11:33
can someone please help me with krack, just the basic i rly want to get into it but i havent found any real tutorials

grid
2017-11-22, 12:23
Best place to start is the krackattacks.com website. There's a link to scripts written by the researcher who discovered the vuln.

mmusket33
2017-11-23, 07:21
Here are some links to what may be work in progress.

https://github.com/DavidBurkett/KRACK-Attack

https://github.com/omaidf/KRACK-toolkit


Other info of interest

https://www.kali.org/news/kali-on-krack/


Musket Teams

grid
2017-11-27, 12:30
Thanks for the other links, mmusket33