“The aim of the attack is to determine the keystream for
communication between the Access Point (AP) and the client –
without knowledge of the original key. Further packets from the AP
to the client can be decrypted with relatively little effort. With
the keystream, attackers can encrypt their own packets and send
them to a client, for instance to divert further traffic using
falsified ARP or ICMP packets.“Originally developed by Martin Beck and Erik Tews, the method
is essentially a variant of the chopchop attack, which involves
reconstructing the checksum of an intercepted packet, sending the
packet to an access point, and observing whether the packet is
accepted by the access point.”
Attack on WPA refined
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis