Street dating revealed password speed dating gunwharf
The research behind the attack will be presented at the Computer and Communications Security (CCS) conference, and at the Black Hat Europe conference.
As described in the introduction of the research paper, the idea behind a key reinstallation attack can be summarized as follows.
When attacking other devices, it is harder to decrypt all packets, although a large number of packets can nevertheless be decrypted.
In any case, the following demonstration highlights the type of information that an attacker can obtain when performing key reinstallation attacks against protected Wi-Fi networks: Our attack is not limited to recovering login credentials (i.e. In general, any data or information that the victim transmits can be decrypted.
During our initial research, we discovered ourselves that Android, Linux, Apple, Windows, Open BSD, Media Tek, Linksys, and others, are all affected by some variant of the attacks.
For more information about specific products, consult the database of CERT/CC, or contact your vendor.