{"id":1711,"date":"2017-10-18T07:05:48","date_gmt":"2017-10-18T05:05:48","guid":{"rendered":"http:\/\/www.makes-it-work.de\/?p=1711"},"modified":"2017-10-18T07:07:30","modified_gmt":"2017-10-18T05:07:30","slug":"wpa2-rekeying-exploit-krack","status":"publish","type":"post","link":"https:\/\/www.makes-it-work.de\/en\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/","title":{"rendered":"WPA2 Rekeying Exploit KRACK"},"content":{"rendered":"<p>KRACK ist ein <strong>Exploit<\/strong>, der von der <strong>Forschungsgruppe<\/strong> Imec-DistriNet der KU Leuven ver\u00f6ffentlicht wurde. Es wurden bis zu <strong>zehn Schwachstellen<\/strong> in WPA- bzw. WPA2-Protokollen identifiziert. Diese Protokolle sind aktuell f\u00fcr die <strong>Sicherheit moderner Wi-Fi-Netzwerke<\/strong> zust\u00e4ndig.<!--more--><\/p>\n<p>KRACK nutzt eine &#8220;<strong>Key Reinstallation Attack<\/strong>&#8220;, wozu er sich in den WLAN-Verbindungsaufbau einklinkt. Hierf\u00fcr <strong>manipuliert<\/strong> der Exploit den <strong>Handshake<\/strong>, der in vier Schritte aufgeteilt ist, zwischen <strong>WLAN-Client und Access Point<\/strong>.<br \/>\nEine &#8220;<strong>Reinstallation<\/strong>&#8221; eines bereits verwendeten Session-Keys erlaube es dem Exploit, Pakete bei einer <strong>AES-CCMP<\/strong> Verschl\u00fcsselung zu <strong>entschl\u00fcsseln<\/strong> und <strong>weiterzuleiten<\/strong>. Bei einer <strong>TKIP bzw. GCMP<\/strong> Verschl\u00fcsselung k\u00f6nnen Pakete nicht nur <strong>entschl\u00fcsselt<\/strong> und <strong>weitergeleitet<\/strong>, sondern auch <strong>gef\u00e4lscht<\/strong> werden. Die <strong>WLAN-Passphrase<\/strong> kann der Exploit jedoch <strong>nicht in Erfahrung<\/strong> bringen.<\/p>\n<p><strong>Kurz und knapp gesagt:<\/strong><br \/>\n&#8211; Ein Angreifer kann beliebige Pakete entschl\u00fcsseln<br \/>\n&#8211;\u00a0Ein Angreifer kann Broadcast- und Multicast-Frames wiedergeben<br \/>\n&#8211;\u00a0Ein Angreifer k\u00f6nnen beliebige Pakete entschl\u00fcsseln und injizieren (Nur TKIP oder GCMP)<br \/>\n&#8211;\u00a0Ein Angreifer kann den Client dazu zwingen, einen vorhersehbaren Verschl\u00fcsselungsschl\u00fcssel zu verwenden (ANDROID 6.0+ und LINUX)<br \/>\n&#8211;\u00a0Ein Angreifer kann WPA2-Passphrase nicht wiederherstellen<br \/>\n&#8211;\u00a0Ein Angreifer kann keine Pakete injizieren (Nur AES-CCMP)<\/p>\n<p>Informationen zu der <a href=\"http:\/\/www.makes-it-work.de\/sicherheitsluecke-krack-ubiquiti-verwundbarkeit\/\">Verwundbarkeit von Ubiquiti Produkten<\/a> finden Sie nat\u00fcrlich auch in unserem Blog.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>KRACK ist ein Exploit, der von der Forschungsgruppe Imec-DistriNet der KU Leuven ver\u00f6ffentlicht wurde. Es wurden bis zu zehn Schwachstellen in WPA- bzw. WPA2-Protokollen identifiziert. Diese Protokolle sind aktuell f\u00fcr die Sicherheit moderner Wi-Fi-Netzwerke zust\u00e4ndig.<\/p>\n","protected":false},"author":11,"featured_media":1552,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"_mi_skip_tracking":false,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_ti_tpc_template_sync":false,"_ti_tpc_template_id":"","_links_to":"","_links_to_target":""},"categories":[101,95],"tags":[],"translation":{"provider":"WPGlobus","version":"2.12.0","language":"en","enabled_languages":["de","en"],"languages":{"de":{"title":true,"content":true,"excerpt":false},"en":{"title":false,"content":false,"excerpt":false}}},"jetpack_featured_media_url":"https:\/\/www.makes-it-work.de\/wp-content\/uploads\/2017\/03\/titel-ohne-logo.jpg","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WPA2 Rekeying Exploit KRACK - Makes IT work - der Blog von OMG.de<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WPA2 Rekeying Exploit KRACK - Makes IT work - der Blog von OMG.de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/\" \/>\n<meta property=\"og:site_name\" content=\"Makes IT work - der Blog von OMG.de\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/omgdegmbh\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-18T05:05:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-18T05:07:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.makes-it-work.de\/wp-content\/uploads\/2017\/03\/titel-ohne-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/omgde\" \/>\n<meta name=\"twitter:site\" content=\"@omgde\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#organization\",\"name\":\"OMG.de\",\"url\":\"https:\/\/www.makes-it-work.de\/en\/\",\"sameAs\":[\"https:\/\/twitter.com\/omgde\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.makes-it-work.de\/wp-content\/uploads\/2021\/11\/Logo_OMG_PNG-Kopie.png\",\"width\":358,\"height\":356,\"caption\":\"OMG.de\"},\"image\":{\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#website\",\"url\":\"https:\/\/www.makes-it-work.de\/en\/\",\"name\":\"Makes IT work - der Blog von OMG.de\",\"description\":\"Themen und News rundum IT und Technik. Von den Spezialisten der OMG.de GmbH.\",\"publisher\":{\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.makes-it-work.de\/en\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.makes-it-work.de\/wp-content\/uploads\/2017\/03\/titel-ohne-logo.jpg\",\"width\":800,\"height\":300},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/#webpage\",\"url\":\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/\",\"name\":\"WPA2 Rekeying Exploit KRACK - Makes IT work - der Blog von OMG.de\",\"isPartOf\":{\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/#primaryimage\"},\"datePublished\":\"2017-10-18T05:05:48+00:00\",\"dateModified\":\"2017-10-18T05:07:30+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/\"]}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#\/schema\/person\/df33283d5b627eda7bddae4a2dd64181\"},\"headline\":\"WPA2 Rekeying Exploit KRACK\",\"datePublished\":\"2017-10-18T05:05:48+00:00\",\"dateModified\":\"2017-10-18T05:07:30+00:00\",\"commentCount\":0,\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/#primaryimage\"},\"articleSection\":\"Administration,Blog\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.makes-it-work.de\/2017\/10\/18\/wpa2-rekeying-exploit-krack\/#respond\"]}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#\/schema\/person\/df33283d5b627eda7bddae4a2dd64181\",\"name\":\"OMG.de GmbH\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.makes-it-work.de\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/97e00d12fb4a6e1b5fb914641a3091e7?s=96&d=mm&r=g\",\"caption\":\"OMG.de GmbH\"},\"description\":\"Als Spezialist f\\u00fcr Ubiquiti, MikroTik, LoRaWAN, Cambium Networks und Kerio beliefern wir Sie schnell und zuverl\\u00e4ssig.\",\"sameAs\":[\"https:\/\/www.facebook.com\/omgdegmbh\",\"https:\/\/www.instagram.com\/omg.de_gmbh\/\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/omgde\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/posts\/1711"}],"collection":[{"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/comments?post=1711"}],"version-history":[{"count":3,"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/posts\/1711\/revisions"}],"predecessor-version":[{"id":1714,"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/posts\/1711\/revisions\/1714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/media\/1552"}],"wp:attachment":[{"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/media?parent=1711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/categories?post=1711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.makes-it-work.de\/en\/wp-json\/wp\/v2\/tags?post=1711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}