Results 1 to 7 of 7

Thread: Kracks a new WPA2 exploit

  1. #1
    Senior Member
    Join Date
    Jul 2013
    Posts
    805

    Kracks a new WPA2 exploit

    MTeams is studying this new Kracks Exploit for WPA2

    See https://www.infopackets.com/news/102...-you-need-know

    For a how to search

    How to use Krack Vulnerability CVE 2017-13082 I Kali Linux 2017.2

    Musket Teams
    Last edited by mmusket33; 2017-11-06 at 12:53 PM.

  2. #2
    Senior Member
    Join Date
    Apr 2013
    Location
    in a computer
    Posts
    683
    Appreciate the link to additional information.

    My view is that, while this is a problem, I feel it's been over-hyped. Rogue/evil twin access points are more dangerous.

  3. #3
    Senior Member
    Join Date
    Oct 2016
    Location
    /dev/sda
    Posts
    731
    Quote Originally Posted by grid View Post
    I feel it's been over-hyped
    Yeah I said the same thing in stack exchange Information Security site. KRACK vulnerability was overhyped but not because WPA/WPA2 had this weakness. It is because it was spotted after 14 years when WPA/WPA2 was accepted as a standard by IEEE without checking this "key sent twice condition".

    This vulnerability has a very small attack vector so KRACK is not going to be widely used by pentesters. However, a social engineering attack may use this exploit. An attacker can easily redirect the victim's http traffic to his fake "router firmware update" webpage and can ask the victim to enter Pre-shared key to initialize the fake router update so everyone should update their firmware.

    KRACK vulnerability is already discussed in CCS 2017 conference but the author didn't release the attacking script until the world is patched. But i think people are still making KRACK tools on github.
    Last edited by _defalt; 2017-11-06 at 01:48 PM.

  4. #4
    Senior Member
    Join Date
    Apr 2013
    Location
    in a computer
    Posts
    683
    Agreed, _defalt. As the researcher mentioned on his site, the problem is in the WPA/WPA2 protocol...a replay issue. I can certainly see the effectiveness of the social engineering attack you described.

    I've been watching github & other places for KRACK tools as well. Might even take a crack (pun intended ) at writing such a tool myself.

  5. #5
    Junior Member
    Join Date
    Nov 2017
    Posts
    1
    I wonder if KRACK could be used for bandwidth leeching?

    It would work like a side tap to the connection of the authenticated WPA2 client.

    1) Use KRACK to get a MITM position.
    2) Inject packets with requests.
    3) Intercept responses.

    Someone could eventually even wrap those tasks to look like a 127.0.0.1 socks proxy or vpn for anonymous browsing or file transfers.

  6. #6
    Senior Member
    Join Date
    Oct 2016
    Location
    /dev/sda
    Posts
    731
    Quote Originally Posted by bidi View Post
    I wonder if KRACK could be used for bandwidth leeching?

    It would work like a side tap to the connection of the authenticated WPA2 client.

    1) Use KRACK to get a MITM position.
    2) Inject packets with requests.
    3) Intercept responses.

    Someone could eventually even wrap those tasks to look like a 127.0.0.1 socks proxy or vpn for anonymous browsing or file transfers.
    1)KRACK itself requires MITM to work.
    2)In WPA2/CCMP you can't tamper with the data because they are authenticated using CBC-MAC.
    3)Interception is possible once you decipher the traffic by initiating KRACK.

  7. #7
    Junior Member
    Join Date
    Nov 2017
    Posts
    1

    Where can i find a tutorial on Krack?

    can someone please help me with krack, just the basic i rly want to get into it but i havent found any real tutorials

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •