Am I missing something, or is the Android/wpa_supplicant "all zero key" KRACK bug mostly FUD? Surely wrong key = traffic can't flow.
-
Show this thread
-
Sure, maybe if you have an app spamming UDP or something, but in practice you're going to get a bunch of TCP retransmits and then death, no?
1 reply 2 retweets 0 likesShow this thread -
I'm sure you can target some protocols to leak secrets, but this sounds *way* more invasive&impractical than the implied "it's cleartext".
3 replies 0 retweets 2 likesShow this thread -
Replying to @marcan42
send a DHCP server response to set the DNS to one controlled by attacker?
1 reply 0 retweets 1 like -
Replying to @julianor
Doesn't help you MITM an intranet, which is the biggest threat of these WiFI attacks. Public internet use should already be untrusted.
1 reply 0 retweets 0 likes -
Replying to @marcan42
what protocol would you MiTM in the intranet disconnected from the public internet?
1 reply 0 retweets 0 likes -
Replying to @julianor
Anything. People (sadly) still believe in network security. Plenty of businesses give you juicy stuff if you can get on their WiFi.
1 reply 0 retweets 0 likes
(but this attack doesn't let you do that)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.