Skip to main content

Use of KRACK Attack to Obtain Sensitive Information

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 11005))

Abstract

This project presents an implementation of the recent KRACK attack for hacking WPA2 networks and obtaining sensitive information such as passwords, credit card numbers, messages, pages visited by the victim, etc., this attack works against any current modem, and depending on the operating system, and configuration of the network, you can inject or modify information. This project will show its operation for a Linux operating system laptop that connects to a Wi-Fi network encrypted with WPA2 protocol, and you will obtain sensitive information through KRACK attacks. Additionally, it will explain how to identify if you are being victim of this attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. https://github.com/vanhoefm/krackattacksscripts

  2. https://techcrunch.com/2017/10/16/hereswhat-you-can-do-to-protect-yourself-from-thekrack-wi_-vulnerability/

  3. https://www.krackattacks.com/

  4. Vanhoef, M.: Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2

    Google Scholar 

  5. Li, Y.: No-Match Attacks and Robust Partnering Definitions—Defining Trivial Attacks for Security Protocols is Not Trivial

    Google Scholar 

  6. http://home.bt.com/techgadgets/computing/windows-7/windows-7-support-end-11364081315419

  7. https://en.wikipedia.org/wiki/MacOS

  8. InteropNet Labs: What’s Wrong With WEP?

    Google Scholar 

  9. http://www.zdnet.com/article/here-is-everypatch-for-krack-wi-_-attack-availablerightnow/

  10. SANS Institute InfoSec Reading Room, Wireless Network Audits using Open Source tools

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Octavio José Salcedo Parra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Epia Realpe, L.F., Parra, O.J.S., Velandia, J.B. (2019). Use of KRACK Attack to Obtain Sensitive Information. In: Renault, É., Boumerdassi, S., Bouzefrane, S. (eds) Mobile, Secure, and Programmable Networking. MSPN 2018. Lecture Notes in Computer Science(), vol 11005. Springer, Cham. https://doi.org/10.1007/978-3-030-03101-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03101-5_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03100-8

  • Online ISBN: 978-3-030-03101-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics