Skip to main content


Showing posts from November, 2017

All your wireless belong to us - Hacker

If you haven't read the news about all WPA2 protocol is vulnerable . CERT Coordination Center (CERT/CC) has released information on Wi-Fi Protected Access II (WPA2) protocol vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. The vulnerabilities are in the WPA2 protocol, not within individual WPA2 implementations, which means that all WPA2 wireless networking may be affected. Source:  Vulnerability Note VU#228519 It is a vulnerability attacking all modern Wireless Access Point that use WPA2 protocol to exploit clients connected on the wireless network. Exploiting this vulnerability requires the following: Programming skills to run against the key reinstallation attacks (Kracks), currently the proof of concept script is not (yet) available to the public. The attacker needs to be close to the WAP, know the SSID which is broadcasting by default. Clone the wireless network and create a rouge channel. Forwarding