All Talks

KRACKing WPA2 Using Key Reinstallation Attacks

KRACKing WPA2 Using Key Reinstallation Attacks by Mathy Vanhoef

These talks explain how the KRACK attack against WPA2 works. Summarized, this attack abuses features of WPA2 to reinstall an already-in-use key, thereby resetting nonces and/or replay counters associated with this key. We show that our novel attack technique breaks several handshakes that are used in a protected Wi-Fi networks.

Thanks for watching this video and you can join us on various social networking sites. Website: …

You might be interested in: