{"id":4757,"date":"2017-10-16T11:09:09","date_gmt":"2017-10-16T15:09:09","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall17\/?p=4757"},"modified":"2017-10-16T11:09:29","modified_gmt":"2017-10-16T15:09:29","slug":"wpa2-cracked","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/2017\/10\/16\/wpa2-cracked\/","title":{"rendered":"WPA2 Cracked"},"content":{"rendered":"<p>https:\/\/www.krackattacks.com\/<\/p>\n<p>&nbsp;<\/p>\n<p>WPA2 encryption has been compromised. KRACK Attacks or Key Reinsallation Attack allows hackers to decrypt packets in Wifi traffic and &#8230; &#8220;use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on.\u00a0<strong>The attack works against all modern protected Wi-Fi networks<\/strong>.&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p>Things to note:<\/p>\n<ul>\n<li>The entire WPA protocol is vulnerable, meaning that this isnt specific to a certain product or implementation<\/li>\n<li>According to Wigle.net &#8211; a Wifi wardriving analysis site, there are &gt;390M Wifi Networks in the US (that have been found) with nearly 60% of them using WPA2 &#8211; as of Jan 2017.<\/li>\n<li>This vulnerability CAN be fixed but you must patch<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>I wonder if this will speed up the adoption of a new protocol.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.krackattacks.com\/ &nbsp; WPA2 encryption has been compromised. KRACK Attacks or Key Reinsallation Attack allows hackers to decrypt packets in Wifi traffic and &#8230; &#8220;use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, [&hellip;]<\/p>\n","protected":false},"author":15895,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716352],"tags":[],"class_list":{"0":"post-4757","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-07-policy-documents-video","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/users\/15895"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/comments?post=4757"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4757\/revisions"}],"predecessor-version":[{"id":4759,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4757\/revisions\/4759"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/media?parent=4757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/categories?post=4757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/tags?post=4757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}