Explore the intricacies of the KRACK attack against WPA2 in this 56-minute conference talk from Nullcon Goa 2018. Delve into the novel attack technique that exploits WPA2 features to reinstall an already-in-use key, resetting nonces and replay counters. Discover how this method breaks several handshakes used in protected Wi-Fi networks, as explained by Mathy Vanhoef. Gain valuable insights into the vulnerabilities of widely-used wireless security protocols and understand the implications for network security.
Overview
Syllabus
Nullcon Goa 2018:- KRACKing WPA2 Using Key Reinstallation Attacks
Taught by
nullcon