Replies
-
Sigg3 7 years ago@Pensador_13 Thank you for the PSA:)
It's a very bad loophole and at home we have a washing machine with wifi (don't ask, I don't know why). I doubt it'll ever receive security updates :-P- 0
-
-
Sigg3 7 years agoThis is old news:) WPA2 is still secure, this attack piggybacks on a logical error in the 802.11 protocol design. WPA2 is not decrypted.
wpa_supplicant was the target (and has been patched). The problem is Android clients that don't receive updates.
The attack is MITM. It works by repeating steps 3 and 4 of the 4 way handshake towards the AP, while acting as a AP itself to the client. This resets the nonce in the key stream to a previously known value. Client's traffic goes through fake AP.- 3