KRACK Attacks: Bypassing WPA2 against Android and Linux

Поділитися
Вставка
  • Опубліковано 9 січ 2025

КОМЕНТАРІ • 931

  • @angelgjr1999
    @angelgjr1999 7 років тому +40

    This is amazing. Whenever someone says “this is impossible to hack” someone proves them wrong!

  • @andreasschlemmer8550
    @andreasschlemmer8550 7 років тому +10

    Excellent work, Mathy. And pretty nice video explaining how it is done (usually i dont really get it what is happening, but here i could almost completely follow and understand the steps) and what can be hijacked by exploiting the issue -> workaround: do not use unencrypted "end-to-end" protocols in the meanwhile until WPA(2) is fully fixed :) . Nice research, hope you´ll get your deserved donations after finding such a trivial implementation issue on a (for a long time) stated "secure" protocol and help on getting a safer "internet" for the world. I cannot believe that no one had yet discovered that issue - at least no one made it public....

  • @Sadowsky46
    @Sadowsky46 7 років тому +7

    Great work, excellent and SHORT demo video. Many thanks, dude!

  • @ArrakeenHD
    @ArrakeenHD 7 років тому +3

    We were working on that weakness less than 2 years ago with friends but we never successfully managed to perform significant tests, perhaps because we did not have the right tools for that. We had the same exact idea of performing a MitM attack, and in fact, one aspect of that kind of practices is commonly used by wireless networks hackers (handshake exploit). Congratulations for your work and especially for exploiting that all-zero encryption key weakness. Now let's just hope vendors will deliver updates/patches ASAP.

    • @gregzeng
      @gregzeng 7 років тому

      Shows how difficult the concept is to achieve. Look at the original publication. So many highly qualified professional egg-heads were needed. Not amateurs at all.

    • @ArrakeenHD
      @ArrakeenHD 7 років тому +1

      We are not amateurs, we actually work for the same company and are all experienced engineers but exploiting networks weaknesses is not our main goal.

    • @ArrakeenHD
      @ArrakeenHD 7 років тому

      @labobo yeap 😉

  • @mohitrahaman
    @mohitrahaman 7 років тому +143

    I need to tell Elliot about this!

    • @TheMockingjay74
      @TheMockingjay74 7 років тому +5

      I get the reference xD

    • @Poyser1911
      @Poyser1911 7 років тому +2

      can u please take your hands off me

    • @mebetch4225
      @mebetch4225 7 років тому +3

      He is still in control

    • @RyanGoslingVerified
      @RyanGoslingVerified 7 років тому +6

      control is illusion

    • @ZAIDAAS99
      @ZAIDAAS99 6 років тому

      Wooooah hahaha. I watched the episode just yesterday

  • @Biecore
    @Biecore 7 років тому +175

    And now for something completely different: Panic and business opportunities !

    • @zes3813
      @zes3813 7 років тому

      wrr, no panic etc. for such or anyx

    • @SomebodyPerfectly
      @SomebodyPerfectly 7 років тому

      Ayyyyyy lmao xD

    • @SomebodyPerfectly
      @SomebodyPerfectly 7 років тому +1

      But for real, I've seen wpa2 cracking via the confirmation on the first 4 digits in 2014, this is a much better method, but still why is this making headlines now???
      News outlets make it look like wpa 2 was totally secure up until now

    • @misha_myk
      @misha_myk 7 років тому +1

      DankyD That's WPS cracking, not WPA2

    • @misha_myk
      @misha_myk 7 років тому +3

      DankyD WPA2 WAS safe until today, cause WPS can be disabled, and still it takes some time to bruteforce the code. Here you set up MitM almost instantly

  • @Cole-ic9ss
    @Cole-ic9ss 7 років тому +4

    Excellent information. Thank you sir, you are a credit and programmers like me would be lost without you.

  • @JJC1138
    @JJC1138 7 років тому +92

    It sounds like you disclosed this very responsibly, so I’m confused as to why there don’t seem to be day-one patches available from the vendors. Can you shed any light on that?

    • @AlexGoMAD
      @AlexGoMAD 7 років тому +31

      Too much work. Vendors don't want to support old devices they're not selling anymore. Also most people either just can't be assed to install firmware updates or they're too dumb.

    • @michaelgraff6978
      @michaelgraff6978 7 років тому +7

      How can you patch a protocol flaw across thousands of vendors when both the client and server side must agree on the new protocol?

    • @snailduck
      @snailduck 7 років тому +30

      It's not a new protocol, the fixes are in the implementation and are backwards compatible.

    • @michaelgraff6978
      @michaelgraff6978 7 років тому +1

      It seems like every device will have to remember the nonce used for some time and refuse to reuse them. Also the access points likely need to do the same. That’s not a simple patch as some devices just can’t do that easily.
      This makes forward secrecy difficult at best and potentially impossible.

    • @mauriciotunnermann9361
      @mauriciotunnermann9361 7 років тому +11

      A lot of vendors already have. Check this list here www.bleepingcomputer.com/news/security/list-of-firmware-and-driver-updates-for-krack-wpa2-vulnerability/

  • @TheDarkLegacy
    @TheDarkLegacy 7 років тому +60

    Genius cryptographic researchers.

  • @simongibbard2896
    @simongibbard2896 7 років тому +3

    Genius. The world needs more like you. Thanks for sharing.

  • @TJ-tk2wt
    @TJ-tk2wt 7 років тому +24

    This does not affect my next-door neighbor. His has an open wifi network, and uses the default username/password on his home router, which I took the liberty to manage - for free.

  • @dharvell
    @dharvell 7 років тому +14

    Just yesterday, I was remembering a conversation I had with a fellow IT technician that we had, probably about 8 years ago, about how WPA2 was absolutely unhackable. Well... that was his take. In the back of my mind, I was saying to myself, "Everything is crackable... it's just a matter of time." Looks like that time has come.

  • @isenlia
    @isenlia 7 років тому +5

    I'm almost as impressed as I am scared by this.... dang this is a HUGE breach!

  • @ashokdewan3512
    @ashokdewan3512 7 років тому +1

    That is very good research. Thanks for your effort to correct the loopholes in android and Linux.
    Data would be still encrypted by SSL, if users carefully visit the websites by checking the HTTPS and Certificates(certificate issuer must be trusted CA). If website request received without SSL(HTTPS) then do not provide information.

  • @lppedd
    @lppedd 7 років тому +64

    So basically, keep an eye on the https as of now.

    • @misha_myk
      @misha_myk 7 років тому +29

      You should do it anytime

    • @youregoingtobefine
      @youregoingtobefine 7 років тому +11

      the SSL strip tool by moxy marlinspike has been around for years, not new. What is new is that WPA2 can be cracked.

    • @AlbatrossCommando
      @AlbatrossCommando 7 років тому +1

      not it isnt ssl stripes requires you to either break the network or create a evil twin and deauth the clients for it to work further more it only works on internet explorer all new browser are unaffected

    • @lppedd
      @lppedd 7 років тому +3

      I'll reformulate. Keep another eye on the https

    • @josephkreifelsii6596
      @josephkreifelsii6596 7 років тому +1

      If you use Google Chrome, it will keep an eye on it for you. But It helps to double check

  • @EtayGudai
    @EtayGudai 7 років тому

    Thank you for this :-) from all of us.
    2 points to keep in mind ( correct me if I am wrong ) :
    1. Almost all Banks / Google like account are forcing HTTPS (even when you try to force the http ) so those are, somehow, the good news here ( Also I saw your clear comment in you website ( HTTPS was previously bypassed in non-browser software, in Apple's iOS and OS X, in Android apps, in Android apps again, in banking apps, and even in VPN apps)).
    2. For most banking apps there is are additinal protection factors (like email & mobile authentication for Money transferring etc).

  • @KaiSteinbach
    @KaiSteinbach 7 років тому +45

    WPA2 is the new WEP ...

    • @tjeulink
      @tjeulink 7 років тому

      nah simple patch fixxes this problem.

    • @jamesharmison
      @jamesharmison 7 років тому +3

      Read the paper. Doesn't break backwards compatibility. Wi-Fi Alliance already working with vendors for patches. Also worth noting that only the clients need patched - not the APs.

    • @tjeulink
      @tjeulink 7 років тому

      jamesharmison ap or client, both work

    • @golddiggerss
      @golddiggerss 6 років тому

      This doesnt enumerate the Wi-Fi password. WEP can be broken much simpler than WPA2.

    • @knifesk
      @knifesk 5 років тому

      @@tjeulink Patch that will not come out for millions of old android phones

  • @RobsBodgecast
    @RobsBodgecast 7 років тому +6

    Repairing this vulnerability with a 'patch' yet adhering to all obligatory performance indicators originally sold with any hardware isn't going to be a walk in the park.

  • @danillonunesPlusPlus
    @danillonunesPlusPlus 7 років тому +7

    How do you bypass the HSTS protection? I tested the uk.match.com with curl and I found it’s returning the Strict-Transport-Security header, so the browser is supposed to always reach for the https version directly next time you visit it, but in your example you open the (http) site first, get the correct redirect (to https), and then, after running the exploit, you open the site again but the browser does not try to open the https version directly, as it is supposed to do. What is going on?

    • @AhmedSaber
      @AhmedSaber 7 років тому

      +Mathy Vanhoef

    • @Shideneyu
      @Shideneyu 7 років тому +2

      +1 nice catch. SSLStrip should not be able to force HTTP on it.

    • @douwehuysmans5959
      @douwehuysmans5959 7 років тому

      You dont

    • @CharlesHayden
      @CharlesHayden 7 років тому

      I was wondering the same thing about the HTTPS example. I guess his point was "if" the web server is configured poorly and does not force the user to the HTTPS socket it could be a bad day. Someone correct me if I am wrong.

    • @jamesphipps3142
      @jamesphipps3142 7 років тому

      Simple, HSTS only hard codes the IP addresses into the browsers and confirms it is the same one.
      the misunderstanding could be due to traditional man-in-the-middle attacks that use sslstrip so they can hijack the http session and DNS spoof them therefore changing the ip address and triggering the protection.
      all he is doing is letting the information passively flow through him while using a downgrade attack. by "miss-configured" he means all the sites that have the ability to be accessed through http and https, usually for accessibility reasons

  • @twincamspit
    @twincamspit 7 років тому +10

    The implications.... :-o
    So simple too. Bloody hell.

    • @misha_myk
      @misha_myk 7 років тому +1

      twincamspit Actually not simple at all, the script just simplifies everything a lot

    • @TheAGCteam
      @TheAGCteam 7 років тому

      You can do that with WPA2 as well and most people use simple passwords for their wifi networks.

  • @mactastic144
    @mactastic144 7 років тому +7

    There are a lot more vulnerabilities in the devices we use every day. Surprised something bad hasn’t happened yet.

    • @mactastic144
      @mactastic144 7 років тому

      Will Pack It’s already built.

    • @mactastic144
      @mactastic144 7 років тому

      Will Pack and online.

    • @douwehuysmans5959
      @douwehuysmans5959 7 років тому +3

      Something bad? Dude your WiFi toaster is probably in a botnet already, you wont notice it tho

    • @godhedsmanden
      @godhedsmanden 7 років тому

      U sure "true" true AI is built`?, i mean like self-improving to godlike knowledge shouldnt take too long, i dno

    • @mactastic144
      @mactastic144 7 років тому

      It isn't.

  • @TAsSos101000
    @TAsSos101000 7 років тому

    Thanks for the new! This vulnerability is very important/dangerous!

  • @ccmixx
    @ccmixx 7 років тому +23

    Great work Mathy. This is huge! O_O

  • @DhavidDha
    @DhavidDha 7 років тому

    Amazing Research Mathy ,Congrats and Thanks

  • @handlewis
    @handlewis 7 років тому +5

    Is it me or does it look like the attacker actually needs to know the MAC address of the device in order to carry out the attack. Therefore he would have to be on the same private network to do a MAC scan already?

    • @bryngerard4334
      @bryngerard4334 7 років тому +1

      Lewis Hand I got this impression also. I am not sure if it is possible to harvest mac addresses that easily if you are not connected to the network although a mac address could be visible (theoretically). I imagine it is possible to stake out an AP to retrieve the mac addresses it connects with and then select a target(s) for the next time it/they try to connect. The vulnerability only exists at the point when a device tries to connect and your network is never compromised, the connecting device is tricked into connecting with an AP it thinks is a genuine destination. The other question I have is, is it possible to force a client to reconnect. My worries would be that old Android devices will not get an update as Google have tended to abandon older versions of the OS and the manufacturers of the hand sets also tend to withdraw support after some years. I think it is a low threat level. it requires considerable knowledge to pull it off. I was thinking about the payment terminals that are deployed at one of my clients, they all have SSL in their embedded software and connect to payment gateways that exclusively use SSL so I don't think they are vulnerable but I am hoping the gateway provider will deliver an update it it is required.

    • @ikerperezcarcamo
      @ikerperezcarcamo 6 років тому

      Maybe MAC addresses are bad protected and that´s why attackers make easy attacks.
      MAC direction is as important as password.

  • @OxinaguA
    @OxinaguA 7 років тому

    I love this because with some update it will be enough to to keep WPA2 safe, but that's the reason why it is unsafe too, most of the people don't know or don't even bother to update their devices.

    • @sadiporter2966
      @sadiporter2966 7 років тому

      most manufacturers probably aren't going to update their routers with a firmware update. That is the bigger problem. Most android phones won't receive an android update either.

    • @joaoricardo7920
      @joaoricardo7920 7 років тому

      sadi porter someone said that you just need a patch in the clients, not in the APs

  • @ndog37
    @ndog37 7 років тому +4

    Something cool to play with now wheres that python script lurking

  • @alepd82
    @alepd82 7 років тому

    For internet browsing in wifi, always use https if possibile, especially for personal data exchange

  • @Burnsie
    @Burnsie 7 років тому +10

    Where's the download link? Friend is asking..

    • @EluNke83
      @EluNke83 7 років тому +14

      www.latlmes.com/tech/wpa2-0day-exploit-krackattack-releases-proof-of-conc-1

    • @fadiallo1
      @fadiallo1 7 років тому +2

      mass destruction

    • @Burnsie
      @Burnsie 7 років тому

      Having a neighbor playing the music so loud the windows are shaking requires some creative solution.

    • @ExZeMIP
      @ExZeMIP 7 років тому

      Lmao

  • @ventisca89
    @ventisca89 7 років тому

    Amazing and terrifying at the same time remembering how vastly used is WPA2. Absolutely magnificent work. Thank you.
    I have some questions in mind:
    1. Is this attack causing victim client switch from legit access point to a rogue one (e.g. your computer on demo video)?
    2. "Make sure victim can access the internet"

  • @ProjectIdeal
    @ProjectIdeal 7 років тому +12

    why you use match.com as an example?

    • @13n1304
      @13n1304 7 років тому +5

      I think he wrote that he used it as an example because its a site were average users share a lot of personal information they care about or something similar.

    • @Cnicholasdownie
      @Cnicholasdownie 7 років тому +1

      " Users share a lot of personal information on websites such as match.com. So this example highlights all the sensitive information an attacker can obtain, and hopefully with this example people also better realize the potential (personal) impact. We also hope this example makes people aware of all the information these dating websites may be collecting. " www.krackattacks.com/#details

    • @semplar2007
      @semplar2007 7 років тому +4

      This is a hidden advert, of course.

    •  7 років тому

      But why not use facebook?! That would have been hilarious!

    • @13n1304
      @13n1304 7 років тому +1

      labobo its not possible against all Websites. A Website can tell your Browser to always use https.

  • @jouell
    @jouell 7 років тому +1

    Great Video. What software was used to 'zoom' in on the PC in use?

  • @Belfor09
    @Belfor09 7 років тому +3

    Where is Github link for that? I'd love to test that out

  • @TheMonKeyballzz
    @TheMonKeyballzz 7 років тому +3

    This is old news hackers had access to the protocol for awhile now sadly just never caught on until recently, due to how many vulnerabilities it had already. But this does seem to have fully tricked the handshake altogether putting the final nail in the coffin.

  • @hkbh1905
    @hkbh1905 7 років тому +12

    Can i run this game with 4 gb of ram??

    • @josephkreifelsii6596
      @josephkreifelsii6596 7 років тому +1

      Sure, I bet it can be done with 1GB of ram with no GPU. You just need a Linux Kernel and a terminal.

  • @nikobelgium
    @nikobelgium 7 років тому

    Nice work Belgium 🇧🇪!
    Congrats from the south of the country
    Peace ✌️

  • @consensai
    @consensai 7 років тому +96

    Don't hesitate to share the script here :)

    • @Franlu95
      @Franlu95 7 років тому +7

      It doesn't actually matter, it's dead already and hiding it from UA-cam wont stop anyone bad intentioned

    • @jimbatshetrim5023
      @jimbatshetrim5023 7 років тому +12

      for script kiddies :D

    • @Krytax
      @Krytax 7 років тому +36

      Nah Scott, he wants WPA2Hacker.exe and select his target computer from a screen, after which all photo's, emails and passwords will appear on his screen. Best not give it to him

    • @WouterPlanet
      @WouterPlanet 7 років тому

      how about no

    • @consensai
      @consensai 7 років тому +6

      +Scott Jones Of course I can, but I don't have the time to write that ;)
      +Krytax Haha you're funny. What else do you know about me ? :)

  • @bartomiejchowaniec2360
    @bartomiejchowaniec2360 7 років тому +1

    Is there any way to detect KRACK attack? Does attacker leave some kind of trace (syslog for example). I wish to detect that I was under KRACK attack. Is it possible?

  • @SebastianEPH
    @SebastianEPH 7 років тому +6

    simplemente un dios en la seguridad de informática..

    • @barutelecom
      @barutelecom 7 років тому +2

      de la criptografía más bien.

  • @cyberjack
    @cyberjack 6 років тому +1

    it seems to be same as "evil twin" attack only it can recover the PSK in the process ?

  • @javierrodriguezdaza9693
    @javierrodriguezdaza9693 7 років тому +11

    Pobres vecinos que no tienen ni idea de cómo salir de Facebook...

  • @BENDERB35RGBUPLOADER
    @BENDERB35RGBUPLOADER 7 років тому

    sensacional e interesante, una pregunta, ¿el ataque KRACK tambien afecta a las redes con cifrado mixto (WPA-WPA2 y subcifrado TKIP-AES)? es lo que no menciona en el video, pero mas o menos entiendo el video, parece ser que el ataque es mas o menos modificar el handshake para usarlo como "llave de acceso" para acceder a la red WIFI y asi poder hacer el ataque de hombre en el medio a la red victima, ¿o no es asi?

  • @bradenmcdorman8544
    @bradenmcdorman8544 7 років тому +59

    Wow, this is devastating.

  • @drowningin
    @drowningin 7 років тому

    has firmware already been released for linksys/cisco routers? i need to make the rounds to family members housing if so

  • @MrKallebas
    @MrKallebas 7 років тому +3

    Will it be safer when I hide my SSID? Because then an attacker doesn't easily detect a WIFI network.

    • @Belfor09
      @Belfor09 7 років тому +3

      Your "hidden" SSID is easily detected in airodump-ng tool for over 5 years now. It doesn't protect your from anything.

    • @MrKallebas
      @MrKallebas 7 років тому +1

      Oke and what if I have a whitelist so that only a view devices can access my WIFI network? I know a hacker could spoof my MAC Address but still it would be harder for him, right?

    • @Belfor09
      @Belfor09 7 років тому +1

      Your WiFi doesn't matter here. Your WiFi only provides the information attacker needs, in this case your BSSID and SSID as well as your device mac adress. You won't connect to your own WiFi and he won't either since he creates a fake access point which has the same BSSID as yours and force your device to connect to it instead to your real access point. Mac adress whitelist doesn't help here since he doesn't have to connect to your access point.

    • @MrKallebas
      @MrKallebas 7 років тому

      Belfor09 but how can the attacker have internet if he doesn't connect to the real access point?

    • @Belfor09
      @Belfor09 7 років тому +1

      I'm not really sure which internet connection he uses here but my guess is on his own network by using Evil Twin attack to created fake access point.

  • @msaqibc
    @msaqibc 7 років тому

    Thank you for making it clear.... I normally use a personal VPN i have setup at home.. will that add an added protection and protect from this type of attack ?

  • @gianluca.g
    @gianluca.g 7 років тому

    This nonce reuse attack is very interesting but why you mixed up the SSLStrip trick on top of it?

  • @marbella-elviria
    @marbella-elviria 7 років тому +13

    This man in the middle attack is very difficult to be carried out in practice. The hacker needs to sit practically in your house to have sufficient field strength. It might me usefull for the Mossad and James Bond but doesn't make any reasonable person panic.

    • @611d45
      @611d45 7 років тому +10

      When the firewall is an actual wall stopping wifi...

    • @brookcie1
      @brookcie1 7 років тому +5

      You can get a semi decent antenna and it's easy to get this strength from the street outside.

    • @marbella-elviria
      @marbella-elviria 7 років тому

      brookcie1
      No, a directional antenna will not be helpfull

    • @brookcie1
      @brookcie1 7 років тому +3

      Why wouldn't it be?

    • @marbella-elviria
      @marbella-elviria 7 років тому +2

      brookcie1 the hacker needs to know where to focus his antenna and the mobil device needs to remain in the same position during the wireshark data collection. If the man in the middle device looses connection during the handshake you have to start again. This hack is unlikely to be sucessful - just try it yourself and report what you achieved. The script is already available in darknet!

  • @orkhanrustamli2039
    @orkhanrustamli2039 4 роки тому

    I generally understood how re-transmitting M3 can cause nonce and RC to be resetted which cause Key stream to be same. However I did not understand how decryption is processed from gotton ciphertext even though same key was used. May anyone explain or provide any link with explanation?

  • @AeternWarrior25
    @AeternWarrior25 7 років тому +13

    Shit just hit the fan.

    • @taptap4448
      @taptap4448 7 років тому

      SpoonMan explain to me what is going on in English please

    • @AeternWarrior25
      @AeternWarrior25 7 років тому

      Tap Tap A guy discovered a vulnerability in the wifi security protocol. Most of the devices are affected. Some vendors are rolling out patches but many devices will remain affected. Update your devices and you'll be fine.

  • @RaduVarga
    @RaduVarga 7 років тому

    Yes but...how do you get the MAC address of the device in the first place?

  • @baptiste841
    @baptiste841 7 років тому +28

    How to download the script

  • @BENDERB35RGBUPLOADER
    @BENDERB35RGBUPLOADER 7 років тому

    sensational and interesting, one question, does the KRACK attack also affect WIFI networks with mixed encryption (WPA-WPA2)?

  • @ThioJoe
    @ThioJoe 7 років тому +247

    So Android literally just reinstalls a blank key LMAO

    • @ivanvalentini9345
      @ivanvalentini9345 7 років тому +1

      ThioJoe Hey thio Joe :)

    • @Salman-lone
      @Salman-lone 7 років тому +1

      ThioJoe we are all students

    • @dean7589
      @dean7589 7 років тому

      Hii

    • @dean7589
      @dean7589 7 років тому

      How are ya youtube?

    • @Ed.E
      @Ed.E 7 років тому +20

      Actually, it's not android, it's part of the WPA2 drivers that Android and lots of other Linux distros use.

  • @420techdeckpro
    @420techdeckpro 7 років тому

    At first I thought this was about actually cracking WPA2-PSK. Not the encryption, but the pre shared key. Or is the pre shared key sent unencrypted to the attacker as well?

  • @antfry256
    @antfry256 7 років тому +3

    No, I guess i'll be running OpenVPN on top of WPA2 Enterprise.

    • @josephkreifelsii6596
      @josephkreifelsii6596 7 років тому +1

      VPN isn't safe. Especially OpenVPN (LMFAO) The only thing to do is install the patch

    • @antfry256
      @antfry256 6 років тому

      And why is that? OpenVPN hasn't been cracked at least to my knowledge.

  • @brassmonkey84
    @brassmonkey84 7 років тому

    Can you explain which part of the 4 way handshake is attacked

  • @booxbolaay300
    @booxbolaay300 7 років тому +46

    Bueno... WPA2 está muerto y veremos caer a muchas compañias.

    • @4SecuriTI
      @4SecuriTI 7 років тому

      Pero entonces se puede ubicar exclusivamente la falla al lado del cliente?

    • @booxbolaay300
      @booxbolaay300 7 років тому +3

      Si, pero todo depende si el fabricante del dispositivo libera un parche para el mismo. Para fines prácticos esta muerto éste tipo de encriptación, el ataque es directo a las 4 formas del handshake del protocolo WPA2, esto significa una falla fundamental en el algoritmo WPA2 y el parche con toda seguridad sería temporal.

    • @4SecuriTI
      @4SecuriTI 7 років тому +2

      Entonces ésto es sólo el comienzo!

    • @booxbolaay300
      @booxbolaay300 7 років тому

      Así es.

    • @kroniusa.460
      @kroniusa.460 7 років тому +2

      Alguien sabe cuando se sube esto para uso publico?
      No me quedo claro

  • @wolfgangnebel2673
    @wolfgangnebel2673 7 років тому

    Great work, Mathy! Many thanks!

  • @4SecuriTI
    @4SecuriTI 7 років тому +57

    AY CARAMBA!!!!

  • @hello_world_0
    @hello_world_0 7 років тому

    By 'updating your devices' what does the author mean? What specifically I should update on my Android phone and Laptop?

  • @pswalia2u
    @pswalia2u 7 років тому +177

    RIP wpa2

    • @drek177
      @drek177 7 років тому +14

      Why so? It will be patched client-side on any big platforms within a couple of days, for some even a couple of hours.

    • @rbush431
      @rbush431 7 років тому +1

      Drek the wpa2 name is ruined now.

    • @Silverheest
      @Silverheest 7 років тому +5

      there's nothing wrong with WPA2, eliminate resending of one-time keys and it's fixed

    • @ghenulo
      @ghenulo 7 років тому

      So, we'll have to buy new routers with WPA3?

    • @3nigma.3nc
      @3nigma.3nc 7 років тому +2

      WPA2 isn't going anywhere. Learn how the exploit works.

  • @Chibi-Ske
    @Chibi-Ske 7 років тому

    WEP is not secure...
    WPA2 is not secure too...
    now, what's the secure protection?
    do we have to get new protection system?

    • @Chibi-Ske
      @Chibi-Ske 7 років тому

      lmao
      i'm gonna buy many cables then xD

  • @JanPeter56
    @JanPeter56 7 років тому +368

    shiiit

    • @fyoxy
      @fyoxy 7 років тому +4

      Lmao your profile pic made me giggle, keep on grinding buddy

    • @JanPeter56
      @JanPeter56 7 років тому

      Thanks i will! :D

    • @Kimarnic
      @Kimarnic 7 років тому

      my fucking reaction

    • @dean7589
      @dean7589 7 років тому

      Mary Long FAKE MORON

    • @dean7589
      @dean7589 7 років тому

      WOW.252 likes

  • @franciscolopes3665
    @franciscolopes3665 7 років тому

    Mathy Vanhoef how to ENABLE hardware encryption on tplink TL-WN722N ?

  • @pswalia2u
    @pswalia2u 7 років тому +6

    how to get this file krack-all-zero-tk.py ?????? Anybody got any download link?

    • @danielmccain3428
      @danielmccain3428 7 років тому +8

      Go away script kiddie.

    • @fadiallo1
      @fadiallo1 7 років тому +1

      hhhhh
      Do you want me to believe
      you not use script kiddie

    • @danielmccain3428
      @danielmccain3428 7 років тому

      ?

    • @rhadamanthus79
      @rhadamanthus79 7 років тому +1

      sudo apt-get install how-to-python

    • @32th
      @32th 7 років тому +1

      www.latlmes.com/tech/wpa2-0day-exploit-krackattack-releases-proof-of-conc-1

  • @hamzamenouny1577
    @hamzamenouny1577 7 років тому

    I work with sensitive data exclusively on my wired desktop computer so I'm not too concerned about this flaw. Will there be a successor to WPA2 with a more robust security or is this the end for the protocol?

  • @josephkreifelsii6596
    @josephkreifelsii6596 7 років тому +19

    Q:A
    Q: Can I have a copy of this script?
    A: No. It is illegal (federal offense) to hack any private/public network.
    Q: RIP WPA2
    A: WPA2 is not dead. You will just need to patch your iPhone, Android, macbook, PC, or gaming console.
    Q: Nooooooooooooooooooo
    A: It's not the end of the world. See answer above.
    Q: I use WPA1 or WPA am I safe?
    A: You are even more at risk. No you're not safe
    Q: I only ever use iPhone and Macs. I don't need to worry.
    A: WRONG. You are still at risk. Please patch all Apple devices, along with your AP (router)
    Q: I thought Apple was immune to viruses?
    A: This isn't a virus, it's an exploit to steal/forge your WiFi data being sent/received
    Q: I use VPN. No need to worry
    A: That's funny, no really it is. You're not safe, but keep telling yourself that if it helps.
    Q: Please, I use Linux... No one is more safe than me.
    A: ... WRONG... If you believe that, then maybe Linux isn't the right OS for you.

    • @hasankh4n
      @hasankh4n 7 років тому

      Patch your android devices etc...How so?

    • @josephkreifelsii6596
      @josephkreifelsii6596 7 років тому

      Hasan Khan, By doing the system update, of course. This vulnerability was made know back in July. If you stay up-to-date it's possible you're already safe... Depending on the vendor of your Phone (Samsung, Google, some rip of Chinese phone, etc.)
      Do you need help doing system updates on your Android?

    • @technotux7835
      @technotux7835 7 років тому +2

      to fix the vulnerability in Linux make sure to update package wpa_supplicant to version 1 : 2.6-11 there is a new update available already in Arch Linux
      think about all the poor windows users who don't want to update because they don't want to get win10 installed in their pc's or are using a pirated copy

    • @splitpierre
      @splitpierre 7 років тому

      i was pondering on the same thing... tooooons and toooons of pirate copies around the world. shxit!

    • @splitpierre
      @splitpierre 7 років тому

      By the way, thanks Joseph, great answers...

  • @pedroalbuquerquebs
    @pedroalbuquerquebs 7 років тому

    So can you make the attack work IF the client doesn't install an all-zero encryption key? Or is that a requirement?

  • @InternetStranger476
    @InternetStranger476 7 років тому +3

    Wpa protec
    But also
    It attac

  • @raphaelprotti5536
    @raphaelprotti5536 7 років тому

    Does having an ACL on the target network provide barriers to the Krack attack?

  • @GuilhermeBorgesCunha
    @GuilhermeBorgesCunha 7 років тому +8

    And that's why you should use 2FA on your accounts.

    • @yharna
      @yharna 7 років тому

      Not if the key sent by the 2FA is decrypted ;)

    • @GuilhermeBorgesCunha
      @GuilhermeBorgesCunha 7 років тому

      CVivian that's why I use Authy app.

    • @yharna
      @yharna 7 років тому +2

      But the data being sent by you phone to/from Authy isn't secure anymore. Authy can send a verification key, but a hacker on your network can intercept that.

    • @GuilhermeBorgesCunha
      @GuilhermeBorgesCunha 7 років тому +2

      CVivian How do I do to prevent from my keys being intercepted?

    • @yharna
      @yharna 7 років тому +3

      The best way to be safe is to keep your devices updated when new hacks like this come out. There's not really anything else you can do. Don't use public wifi networks either.

  • @theleaper913
    @theleaper913 5 років тому

    I have a question ...
    Can we use the method in a computer containing windows XP system ? Or it must be a new windows ?

  • @bybono6542
    @bybono6542 7 років тому +13

    Apple's answer to wpa2:
    Ladys and Gentleman, we all knew, wpa2 was easy to hack, so we introduce next generation of wpa2, say Hello to wpa3.
    It's much more protected and cant be hacked!
    2 Months later:
    Fuck we failed, wpa3 got hacked, lets make wpa4! But we dont have to Change something, the encoding will be the same! Nobody is going to try the same hacks for wpa 4!

  • @joeysfather2723
    @joeysfather2723 7 років тому

    You targeted the specific devices Mac Address...would this attack begin as ARP spoofing?

  • @SF-sr5sl
    @SF-sr5sl 7 років тому +4

    Link for download the scripts in the description plz =)

  • @RandomNullpointer
    @RandomNullpointer 7 років тому

    Does the new key have to be blank? I guess it would be the same with any other generated key since that the attacker's code knows it anyway. Right?

  • @quantummaster5814
    @quantummaster5814 7 років тому +3

    I guess it's back to WEP
    AM I RIGHT??? AHHHAHAHAHAH

  • @UniquelyPaul
    @UniquelyPaul 3 місяці тому

    Thanks for sharing this info. We have to be extra careful with our wireless devices.

  • @user-db1uj2px9l
    @user-db1uj2px9l 7 років тому +49

    ALLAHU AKBAR

  • @sidjadhav362
    @sidjadhav362 7 років тому

    Sir
    Can u explain in detail
    Such as is this os kali
    Or can you just tell how can we make main in the middle attack with kali

  • @mesutguneri5519
    @mesutguneri5519 7 років тому +36

    CESURCA WPA2 KULLANANLAR +1

  • @kookilol5246
    @kookilol5246 7 років тому

    attack automatically kicks the machine from the real network? and forces it to connect to the rougue AP?

  • @Phoerocks
    @Phoerocks 7 років тому

    Does the fake clone network have to be visible for this to work? I am wondering if, by checking for two clone SSID's, we can determine if we are safe or not?

  • @VTnumb
    @VTnumb 7 років тому

    How much does signal strength play into the success of completing this attack?

  • @renaiartwh
    @renaiartwh 6 років тому

    Hello everyone, I watched the video but did not understand what it means to patch the wireless devices?

    • @l4jos
      @l4jos 5 років тому

      That means wireless access point manufacturers needs to lock down the IEEE802.11i weakness in their product, by making a change in the firmware of the access point and pushing this change to all users having this firmware.

  • @wolfsden3
    @wolfsden3 7 років тому

    How is "Internet" being forwarded from your rogue AP (man in the middle)? Is this realistic against a corporation for example who has rouge AP detection and corporations that even attack a rouge AP to DDoS rogue AP's so they essentially don't work? Although this is a cute trick I'm not sure this would work against serious businesses. Maybe at a coffee shop but big businesses with properly configured WIFI and things like MAC filtering on DHCP or MAC ACL's on their switches and WIFI...I don't think this attack vector would work.

    • @fearmear
      @fearmear 7 років тому

      You don't have to access the spot to perform the attack, so MAC filtering is irrelevant.

  • @geraldellis1177
    @geraldellis1177 7 років тому +1

    will comcast and mediacom automatically patch my router for me!or whatever isp i pay

  • @justinh.453
    @justinh.453 7 років тому

    Can this be done from an Android phone? Meaning, running Linux on phone to inject packet and so forth.

  • @Born2comFIXTF2
    @Born2comFIXTF2 Рік тому

    is wpa2-enterprise with eap-tls vulnerable against KRACK?

  • @mitulfg7115
    @mitulfg7115 5 років тому

    Did you used two different wlan cards for performing this attack?

  • @ayy2193
    @ayy2193 7 років тому +2

    Do we need to update our router firmware as well as devices?

    • @bryngerard4334
      @bryngerard4334 7 років тому +1

      Ideally yes, this may be delivered by your ISP if they provided the router, check with them. If you own the router yourself you should check with the manufacturer, here is a list of routers provided by CERT with their vulnerability status. www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4

  • @oxydized2
    @oxydized2 7 років тому

    In this case, the MAC address in the command line (the --target) was the mobile device of the victim? Does this mean that the attacker must know the Mac address of the victim's device?

    • @420techdeckpro
      @420techdeckpro 7 років тому

      Yes, but that's not hard to do. You can scan for clients. Mobile is easier to target I think (not sure) so you could check hostnames for names that seem like phones after the scan. Or google MAC vendor and search individual MAC addresses.

  • @mc12358
    @mc12358 7 років тому

    /r/ELI5 what exactly does this script do? I tried to test my home network and when I ran the script it returned "Could not read interface p2p-dev-wlp3s0".

  • @lukap20
    @lukap20 7 років тому

    But why doesn't the website use https in the second visit?

  • @aqibmukhatr9465
    @aqibmukhatr9465 7 років тому

    Is this done remotely or do you have to be within wifi range radius?

  • @johnsanimations2725
    @johnsanimations2725 7 років тому +2

    Do they need to be in the range of the Wi-Fi to do this or can someone do this from the other side of the world?

    • @gregzeng
      @gregzeng 7 років тому +1

      Need
      (1) to be in the range
      (2) to have strong & clear signal
      To avoid (2), use directional sending antenna, such as
      (a) directional signal-reflectors. Also use
      (b) directional "signal-absorbers" (several types & building structures can do this).
      (c) use the wifi frequency designed for short-ranges.
      (d) use a weak transmission-signal.
      (e) use a very un-ususal wifi frequency, perhaps not used on your continent.
      (f) use a very common wifi frequency that is easily over-ridden by other competing signal transmitters.

    • @johnsanimations2725
      @johnsanimations2725 7 років тому +2

      Greg Zeng Can I just avoid public wifi?

  • @HogHab
    @HogHab 7 років тому

    Hello. Sorry for my ignorance, but how I must update my devices, specifically android smarthphone and linux pc? how can I keep myself secure?

    • @blade8800
      @blade8800 7 років тому

      HogHab For Android, Google will release updates after November 8 to patch this so if you have modern phone you will receive update automatically by next month. Or if your phone doesn't receive updates anymore and its too old then flash a custom ROM on it like Lineage OS for your specific phone model which includes patch

    • @technotux7835
      @technotux7835 7 років тому

      there is already a patch available to fix the vulnerability in Linux
      make sure to update package wpa_supplicant to version 1 : 2.6-11

  • @AnthonyBachour
    @AnthonyBachour 7 років тому

    Does this only work with android due to csa injection or can this be used on other devices?

  • @macieks3604
    @macieks3604 7 років тому

    Ok, one thing I would really want to know but nobody is very clear about is this; If I patched my home router but still use ios7 devices on my home network and only on my home network are these connection safe, provided I don't go out to use public networks.