KRACKing WPA2 Using Key Reinstallation Attacks
KRACKing WPA2 Using Key Reinstallation Attacks by Mathy Vanhoef
These talks explain how the KRACK attack against WPA2 works. Summarized, this attack abuses features of WPA2 to reinstall an already-in-use key, thereby resetting nonces and/or replay counters associated with this key. We show that our novel attack technique breaks several handshakes that are used in a protected Wi-Fi networks.
Thanks for watching this video and you can join us on various social networking sites. Website: …