Simon Willison’s Weblog

Subscribe

16th October 2017

TL;DR on the KRACK WPA2 stuff - you can repeatedly resend the 3rd packet in a WPA2 handshake and it'll reset the key state, which leads to nonce reuse, which leads to trivial decryption with known plaintext. Can be easily leveraged to dump TCP SYN traffic and hijack connections.

Graham Sutherland

This is a quotation collected by Simon Willison, posted on 16th October 2017.