Linux Today: Linux News On Internet Time.





More on LinuxToday


Attack on WPA refined

Aug 28, 2009, 21:33 (0 Talkback[s])

WEBINAR: On-demand webcast

How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017 REGISTER >

"The aim of the attack is to determine the keystream for communication between the Access Point (AP) and the client – without knowledge of the original key. Further packets from the AP to the client can be decrypted with relatively little effort. With the keystream, attackers can encrypt their own packets and send them to a client, for instance to divert further traffic using falsified ARP or ICMP packets.

"Originally developed by Martin Beck and Erik Tews, the method is essentially a variant of the chopchop attack, which involves reconstructing the checksum of an intercepted packet, sending the packet to an access point, and observing whether the packet is accepted by the access point."

Complete Story

Related Stories: