KRACKing WPA2 Using Key Reinstallation Attacks
Offered By: nullcon via YouTube
Course Description
Overview
Explore the intricacies of the KRACK attack against WPA2 in this 56-minute conference talk from Nullcon Goa 2018. Delve into the novel attack technique that exploits WPA2 features to reinstall an already-in-use key, resetting nonces and replay counters. Discover how this method breaks several handshakes used in protected Wi-Fi networks, as explained by Mathy Vanhoef. Gain valuable insights into the vulnerabilities of widely-used wireless security protocols and understand the implications for network security.
Syllabus
Nullcon Goa 2018:- KRACKing WPA2 Using Key Reinstallation Attacks
Taught by
nullcon
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network