Тёмный

Krack Attacks (WiFi WPA2 Vulnerability) - Computerphile 

Computerphile
Подписаться 2,4 млн
Просмотров 618 тыс.
50% 1

Опубликовано:

 

13 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 527   
@quimlast7180
@quimlast7180 7 лет назад
Crossover episode? Can't wait for tournament arc
@anousenic
@anousenic 7 лет назад
But is it canon?
@justinward3679
@justinward3679 7 лет назад
AnotherUselessNick No this is filler
@rykehuss3435
@rykehuss3435 7 лет назад
did someone say TOURNAMEEENT AAAAAARC
@iamwhatitorture6072
@iamwhatitorture6072 7 лет назад
Rykehuss HYYYYYYYYYPE (Rocket starts)
@charleshizer7118
@charleshizer7118 6 лет назад
Quim Last n
@anothergol
@anothergol 7 лет назад
at last, Philip Seymour Hoffman & Tobey Maguire in the same movie
@troychirashe4000
@troychirashe4000 4 года назад
LOOOOL
@kingmekrillinme4831
@kingmekrillinme4831 3 года назад
This hahaha
@mooo7225
@mooo7225 3 года назад
More like Counter strike hostage and smart call me carson
@gigantishko
@gigantishko 3 года назад
Ahahahahah
@romeo72899
@romeo72899 2 года назад
What a comment 😂
@coolien35
@coolien35 7 лет назад
I wish these guys were my professors!
@expectnull
@expectnull 7 лет назад
Especially both of them together; discussing
@DaVince21
@DaVince21 7 лет назад
They are for these brief 10 minutes!
@zaba67
@zaba67 3 года назад
Study at Nottingham
@StepanStolyarov
@StepanStolyarov 7 лет назад
he krac but he also attac
@NoName-sb4vu
@NoName-sb4vu 7 лет назад
Stepan Stolyarov but most importantly nonce! 😂
@JetJockey87
@JetJockey87 6 лет назад
Clap clap
@EgoShredder
@EgoShredder 6 лет назад
He's got a lot upstairs.....it was an Atic Atac.
@subject2749
@subject2749 6 лет назад
Perfect profile pic for it as well
@drowningcows7631
@drowningcows7631 7 лет назад
i KNEW you'd have a video for this straight away. I woke up, checked my phone, saw this and thought 'can't wait to see the computerphile video about this. I love your videos
@BUSTERmetalJP
@BUSTERmetalJP 7 лет назад
the blond guy looks like pulled out directly from a 90s film...
@sebastianelytron8450
@sebastianelytron8450 7 лет назад
A Computerphile topical video?? Yes please!
@jeffirwin7862
@jeffirwin7862 7 лет назад
A Pound/Bagley crossover?? Yes please!
@benjaminbrady2385
@benjaminbrady2385 7 лет назад
A yes please chain?? Yes please
@Remmes
@Remmes 7 лет назад
It was found by 1 person but his supervisor is added under an honorary authorship.
@jeffirwin7862
@jeffirwin7862 7 лет назад
What about his hypervisor?
@sundhaug92
@sundhaug92 7 лет назад
The hypervisor was virtually included ;)
@NicholasMarkovich
@NicholasMarkovich 7 лет назад
oh no you didn't.
@jennifergrey5546
@jennifergrey5546 7 лет назад
KRACK attacks are new and dangerous, but they can be stopped with WiFi encryption provided by PureVPN.
@heephstan
@heephstan 7 лет назад
This is a joke right? Advertising like this?
@JamEngulfer
@JamEngulfer 7 лет назад
Damn that was fast
@pluto8404
@pluto8404 7 лет назад
A little too fast...
@bargh70
@bargh70 7 лет назад
Something tells me everybody got a memo before the media and common people.
@antoncid5044
@antoncid5044 7 лет назад
Considering Windows released an update to patch this before the media published anything, yeah I would say so. It's common place for the tech industry to find out first and have a window to fix it before the news runs with it. Once the news publishes it there is the risk of the attacks becoming more widespread.
@katrinal353
@katrinal353 7 лет назад
After seeing these videos on it, and reading the paper, that attack seems soooo profound! You see exceptionally simple exploits and blatant lack of security in implementations of many things, but it amazes me that a protocol such as this, has such a basic vulnerability that's part of it's standard. Ironically, implementations that disregard the standard are more secure... That's
@KuraIthys
@KuraIthys 7 лет назад
Well, the systems most at risk are those which tried to patch a vulnerability to a different, less dangerous problem. Ironically fixing one hole created a much bigger one. Perhaps not following the spec was intentional though. If you sense a potential problem with the official implementation you may just choose not to follow the suspect part of the spec. Tou don't nessesarily need to know exactly what the problem is either. A vague notion that part of the spec has an issue might be enough to avoid the issue almost accidentally...
@pij3333
@pij3333 7 лет назад
I've heard that this vulnerability is not specified in the WPA2 standard, it's just a non-specified part of the WPA2 standard that is most commonly set up in an exploitable way.
@kejoki8123
@kejoki8123 7 лет назад
If there are two ways to do something, and one of them leads to disaster, some lazy son-of-a-gun will make that one the standard way of doing it.
@DFX2KX
@DFX2KX 7 лет назад
My Computer Hardware & Networking teacher said it best (though it wasn't about WiFi, it was about disk encryption): The street between the Standard and the Implementation is mostly potholes.
@UntouchedWagons
@UntouchedWagons 7 лет назад
Dr. Pound and Dr. Bagley, 2 of my 3 favourite speakers on Computerphile
@ZXGuesser
@ZXGuesser 7 лет назад
"it needs the be patched, it'll be patched, and then we can all go back to using wifi". Unless we have an android phone, or use wifi repeater hardware that will never see a firmware update, or etc etc. sigh. :(
@Selektionsfaktor
@Selektionsfaktor 7 лет назад
ZXGuesser This sadly is true in way too many cases. The amount of smartphones with Marshmallow or lower is staggering.
@ZXGuesser
@ZXGuesser 7 лет назад
Thank goodness no-one was ever stupid enough to put wifi in cheap consumer electronics and household appliances that couldn't be patched to fix things like this. Then we'd have really been in trouble...
@Phroggster
@Phroggster 7 лет назад
Selek Somewhat ironically, pre-Marshmallow devices are better off than Marshmallow or newer. This is due to a fix for a prior bug that went in to Android 6, and is what introduced the worst-possible-outcome zero-nonce when enduring KRACK.
@KuraIthys
@KuraIthys 7 лет назад
Hey, at least this one CAN be patched. There's an exploit in the USB protocol relating to plug and play that literally cannot be patched because it would break USB. Leave in exploit, or stop using USB. Those are your options...
@meathook3000
@meathook3000 7 лет назад
Android phones suck. [shots fired]
@NoNameAtAll2
@NoNameAtAll2 7 лет назад
Every time I see Mark, I know that something interesting is going to happen
@rudilapa6569
@rudilapa6569 7 лет назад
This sounds similar to the way enigma was broken: forcing reuse of the same key sequence points against varied data (suspected) to get the key back. (Especially the crib dragging, as with the weather reports that were expected in some transmissions.) - ?
@rlewis1946
@rlewis1946 7 лет назад
If only Allan Turing were alive today! He would be in this discussion, I am sure. Yes, I remember reading about those damn weather reports! RL
@maurocolombo2173
@maurocolombo2173 7 лет назад
Actually it reminds me of Prof. Brailsford video about the Lorentz machine...
@davepusey
@davepusey 7 лет назад
Having seen the film Imitation Game, I did think this sounded somewhat familiar.
@clintellis7755
@clintellis7755 4 года назад
I thought WAP2 was supposed to stop traffic and reset the key if more than one TKIP / MIC failure occured within 60 seconds. Wouldn't that limit brute force attacks?
@code-dredd
@code-dredd 7 лет назад
If I could have a penny for every NONCE that was used _only once_ , I would have the _same_ penny.
@richb313
@richb313 7 лет назад
Not really. Odds are the very same number has been used but maybe not by you.
@code-dredd
@code-dredd 7 лет назад
richb313 Don't force my hand; I don't want to kill the joke 😒
@panda4247
@panda4247 6 лет назад
How many Germans does it take to change the light bulb? One. Because they are effective and have no sense of humor.
5 лет назад
eyyy this comment richer than my self esteem.
@Furiends
@Furiends 7 лет назад
Theres a bit of a mistake near the end. The brute forcing methods described in this video apply to Windows and MacOS because keys are reused. That means with some amount of known information the attacker can guess the key. wpa_supplicant used on Linux and Android clears its key resulting in a zeroed-key which means no brute forcing is necessarily because now the key is known. While this is what's demonstrated by the security researcher it would be trivial to go a bit further and compare known information to repeated used keys and then guess the key making Windows and MacOS susceptible so to say "on certain operating systems its relatively benign" is incorrect. Forgery should be possible on any unpatched system that accepts the use of TKIP. So the main other feature of zero-key: forgery is still possible on systems not affected by zero-key like Windows and MacOS. Since both of these OSes happily accept TKIP and most any fairly new router is set to use either TKIP or CCMP (AES) then there is nothing protecting these systems against forgery once keys are guessed.
@mult1vac
@mult1vac 4 года назад
"the belgian university" *giggles* I know belgium is small but we really have a few universities :)
@simeondermaats
@simeondermaats 3 года назад
't Is waarschijnlijk de KU Leuven geweest, die chappies zijn niet normaal wanneer het aankomt op cryptografie lijkt het wel
@DarkVortex97
@DarkVortex97 7 лет назад
This is the superhero team up movie I've been waiting for. No Justice League for me.
@TheAndres411
@TheAndres411 7 лет назад
Top 10 anime crossovers..
@benjaminbrady2385
@benjaminbrady2385 7 лет назад
kek
@kevinpacheco8169
@kevinpacheco8169 7 лет назад
Mike is OP
@stadodo
@stadodo 7 лет назад
just wanted to say this is a great comment
@minimalmo
@minimalmo 7 лет назад
What!?
@surferriness
@surferriness 7 лет назад
Don't say you understand Computerphile if you don't even know the lore..
@AbhishekZambre
@AbhishekZambre 7 лет назад
Was waiting for your video on this.
@AbhishekZambre
@AbhishekZambre 7 лет назад
Yeah, probably one of those vulnerabilities which many institutions knew about it, was exploiting it for years, and didn't revealed it to anyone.
@AD34534
@AD34534 7 лет назад
Ethernet Master Race
@Cleric775
@Cleric775 6 лет назад
*Category 7* . Extra - shielded and buried underground for least possible chance of emission.
@ronarprefect7709
@ronarprefect7709 6 лет назад
I like the cut of your jib.
@sanderhansen7036
@sanderhansen7036 5 лет назад
Hey Dave, is it you who is vocal on the SDE legends kickstarter?
@blackneos940
@blackneos940 5 лет назад
@@Cleric775 And DON'T FORGET THE LEAD. :D
@zakunknown9737
@zakunknown9737 7 лет назад
I really enjoy the videos you guys make. been paid to program for 6 years and still enjoy this channel
@grn1
@grn1 3 года назад
When they were talking about XORing the results I immediately thought about Prof. B's videos on WWII Lorenz cracking and lo and behold they did mention it in the description. Since no one reads the description I figured I'd post this anyway.
@thatoseluku4276
@thatoseluku4276 5 лет назад
I never understand what they're on about but I still watch
@kentvandervelden
@kentvandervelden 7 лет назад
Fascinating video. Thanks for making this so quickly after the announcement.
@kebman
@kebman 6 лет назад
You guys are the best! Thank you for all this golden goodness of computerphility.
@c477um11
@c477um11 6 лет назад
It could be a totally innocent and genuine thing, but I had captions on and lost it at Mikes first line introduing him as Dr Pound.
@RobertT1999
@RobertT1999 7 лет назад
Mike Pound and Steve Bagley. An exciting day this will be for me.
@raunakchhatwal5350
@raunakchhatwal5350 7 лет назад
You should’ve put Mike in the thumbnail for the views
@JamEngulfer
@JamEngulfer 7 лет назад
They did
@raunakchhatwal5350
@raunakchhatwal5350 7 лет назад
JamEngulfer then make it bigger. You barely see it
@Necessarius
@Necessarius 7 лет назад
Only Mike
@IpolsYoutube
@IpolsYoutube 7 лет назад
LordOfRandomStuff I assumed target audience of this channel is a bit better than what your comment implies tbh
@simontay4851
@simontay4851 7 лет назад
LordOfRandomStuff Mike IS in the thumbnail - on the left.
@xplinux22
@xplinux22 7 лет назад
Excellent summary of the attack! Straight and to-the-point, with helpful tidbits along the way.
@Adywsn
@Adywsn 7 лет назад
As soon as you introduced Mike into the video I was like 'aye, Mike's here :D, weird seeing two of you in 1 video' love it though!
@ducky1086
@ducky1086 4 года назад
Mike's introduction was the best
@matthewm.1598
@matthewm.1598 7 лет назад
I just saw an article about this and my first thought was, "This would be better explained by Computerphile...".
@themeeman
@themeeman 6 лет назад
This video and the comments are gold
@MYLFOOD
@MYLFOOD 6 лет назад
This is awesome stuff. I'm glad I found this channel.
@n8style
@n8style 7 лет назад
You know a video is serious when they bring in 2 experts
@robmckennie4203
@robmckennie4203 7 лет назад
Which is why end to end encryption is so important
@nO_d3N1AL
@nO_d3N1AL 6 лет назад
Wow, it's amazing that this exploit wasn't found earlier!
@dyavanapellisujal1394
@dyavanapellisujal1394 8 месяцев назад
the statement "in general its secure until yesterday"😂😂
@user-pj5oi7nk1e
@user-pj5oi7nk1e 7 лет назад
In short.. During WW2 German Enigma failed before it was sending weather info and time at the beginning of the message using the encrypted codes.. If you knew those, you could easily decrypt any message.. Same concept
@nathansmith3608
@nathansmith3608 6 лет назад
Win Dias word, it was hella easy to decrypt enigma. u just had to write up an algorithm, translate it into base 5 instructions implemented as physical wiring connections on a high voltage electro-mechanical early prototype computer, then piece of cake from there It definitely made it easier, but easy is probably saying too much. Also, I think the fact of characters never looping back to themselves was probably a greater vulnerability
@gonzo_the_great1675
@gonzo_the_great1675 Год назад
And 5yrs later, we are all still using wpa2.
@Cygnus0lor
@Cygnus0lor 7 лет назад
Thank God for computerphile. I was too lazy to read it...
@skate2late
@skate2late 6 лет назад
It just makes you think how many other exploits are sitting in the code of critical applications and haven't made it into the mainstream to be fixed yet
@gajbooks
@gajbooks 7 лет назад
Professor Brailsford approves of your guessed plaintext attack.
@NeilRoy
@NeilRoy 7 лет назад
Windows... is safer... well, I lived long enough to hear that. I can die now! ;)
@Sinful_Citrus
@Sinful_Citrus 7 лет назад
Name a more iconic duo
@dreammfyre
@dreammfyre 7 лет назад
Worlds have collided.
@ykl1277
@ykl1277 7 лет назад
A Roadie I never thought they were in the same anime universe. Their character designs are so different.
@AmxCsifier
@AmxCsifier 6 лет назад
Finally, a legit arrow in a thumbnail
@XenoContact
@XenoContact 7 лет назад
I read an entire article and now watched this lovely video but I still don't freaking get it. I am supposed to graduate as an IT engineer next year ! god damn it
@mohammadslim8389
@mohammadslim8389 2 года назад
Well done Victor!
@r00tb33
@r00tb33 6 лет назад
I'm an electronics and telecom major it would be really great if you can make a playlist of all computer science and security videos from your channel and anyone would just skim through it anytime. I'm currently learning CS and the way you explain things it's really awesome but I always have to find videos related to the same topic like stack heap DS etc... and searching consumes a lot of time. Plz do the needful. Thanks!!
@ragnkja
@ragnkja 6 лет назад
This isn't the first time a key was broken because someone sent two or more similar messages using the same key. In fact, that was how the Lorenz Machine was broken during WW2.
@tibo24260
@tibo24260 7 лет назад
Where's the million subs on this channel. RU-vid I don't understand you...
@iamwhatitorture6072
@iamwhatitorture6072 7 лет назад
You need full attention to watch this
@jtveg
@jtveg 7 лет назад
What a hassle. It seems nothing is ever really uncrackable.
@eganwang6573
@eganwang6573 7 лет назад
mathematically, nothing is completely uncrackable-even for passwords that take longer than the life of the universe to crack, there is always a chance to crack the password.
@izimsi
@izimsi 7 лет назад
John Thimakis Well, because it's pretty much true, nothing is unbreakable, it only depends on the current state of knowledge, computing power to use and time.
@Marci124
@Marci124 7 лет назад
quantuuuuum cryptographyyyyyyyyyyyyyyy I thought someone already replied this
@omg_look_behind_you
@omg_look_behind_you 7 лет назад
John Thimakis Guaranteed.
@uniflare
@uniflare 7 лет назад
Quantum would mean you know when someone has intercepted a message. Also, quantum decryption would annihilate any currently used encryption. Basically, as far as I understand, it would be useless using any known encryption algorithm vs a quantum decryptor, and you will only ever know if a message was intercepted. IMO, encryption will die, and only thing left is knowing if someone read your message, or part of. Please correct me if I am wrong :).
@alemutasa6189
@alemutasa6189 7 лет назад
Ohhh yeah, I was waiting for this
@SuperLanyard
@SuperLanyard 6 лет назад
Steve, Great show! Sometime could you do a show on Hardware you personally use. Thanks.
@encomium23
@encomium23 7 лет назад
Love the dot matrix printer paper for note taking!! Gold!
@croutonicus
@croutonicus 7 лет назад
So how do they go about patching this?
@jeffirwin7862
@jeffirwin7862 7 лет назад
With pieces of tape on punchcards, of course.
@aceldama
@aceldama 7 лет назад
by not re-using the same key when message 3 fails. start the whole process over (which means generating a new key pair), not just the counter.
@Phroggster
@Phroggster 7 лет назад
Alex B "They" have to code and deploy a fix, with the "they" being whomever is responsible for the WiFi stack on a particular device, such as Microsoft, Debian, Ubuntu, Apple, Google (and all of their OEM chain, hahaha), etc. For the nitty gritty, here's an example of one of the fixes from OpenBSD ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/041_net80211_replay.patch.sig
@Jergs18
@Jergs18 7 лет назад
Alex B disable fast transfer aka roaming on AP's
@gamersforever1585
@gamersforever1585 7 лет назад
I love this channel and I'll be happy if You add subtitles
@1117johnson
@1117johnson 7 лет назад
Use a long password, so the brute force take time same with the wep issue. and change it from time to time. the old message can keep safe this way.
@technotux7835
@technotux7835 7 лет назад
to fix the vulnerability in Linux make sure to update package wpa_supplicant to version 1 : 2.6-11
@the_quad_father
@the_quad_father 7 лет назад
Wasn't an attack like this always possible using software like LOIC to disrupt the connection and listen to the new handshake?
@Baigle1
@Baigle1 7 лет назад
no, that captures the handshake for password cracking via rainbow/statistical/brute/hybrid methods this is a technicality of how tkip works to use counters in increasing encryption complexity imagine knowing what the psrng would generate as someone tries to log into facebook next for their session key, you could then assume their generated session key and mess with their account without needing to know their password even though its far more complicated than just discovering their password.
@suicidalbanananana
@suicidalbanananana 7 лет назад
Nice, ty for the clearer explanation then yesterdays pdf :D
@gwenynorisu6883
@gwenynorisu6883 6 лет назад
Guess that's why he's still got the Mega STe and Amiga 2000 on standby in the background. Good luck hacking _those._
@paulmann1289
@paulmann1289 7 лет назад
Microsoft has already released a patch for windows.
@vpctech
@vpctech 7 лет назад
I dunno. But good question. Another one : do you need to update your Wifi drivers?.
@DaVince21
@DaVince21 7 лет назад
Patches for Linux have been pushed out too. Developers are really on top of this problem!
@thinkfloyd2594
@thinkfloyd2594 6 лет назад
Exactly; the only one Microsoft wants pilfering your privacy is Microsoft.
@chrisspencer6502
@chrisspencer6502 7 лет назад
Was this proven after confirmed attacks I've seen videos talking about hand shake attacks for getting WiFi keys.
@80amnesia
@80amnesia 6 лет назад
They both joined thier powers, it's like a "Computherphile's Justice League" :-D
@HashimAziz1
@HashimAziz1 3 года назад
I always wonder how Northerner techies like these guys manage to say the word "nonce" without losing it. I know I can't.
@dfsafadsDW
@dfsafadsDW 9 месяцев назад
There was a cut 😂
@keiyakins
@keiyakins 5 лет назад
This seems pretty possible to mitigate by going "oops start over" and reconnecting from the start of you get a second message 3. Am I missing something?
@rkpetry
@rkpetry 5 лет назад
*_...puzzling your description: ►in a key-update-chain, one-use-keys may be used a second time to send the next key, if, ‘co-random’ not-otherwise-recognizable..._*
@KarjamP
@KarjamP 7 лет назад
It sounds like this to be a flaw mainly in the encryption used, itself, rather tha the Wi-Fi standard that used it. Hypethetically, it's still actually secure. It's just that the loopholes mentioned in this video causes the encryption mechanisms to break, thereby making the standard insecure. The flaw in this standard's more its reliance on its encryption, its ultimate trust, than anything else. If I were the standard's designer, I would've expected something like this to happen, and design the standard accordingly, for it's better wisdom not to rely on chance, but on one's expectency for something like this to happen.
@sigh9032
@sigh9032 5 лет назад
when u reset something called "NONCE' xD
@gabetower
@gabetower 7 лет назад
Ahh "provable" security.
@World_Theory
@World_Theory 7 лет назад
This'll probably cause some chaos in the electronics industry.
@seheyt
@seheyt 7 лет назад
What happened to the audio? It sounds muffled with a mild hiss distort
@saultube44
@saultube44 6 лет назад
If only I had teachers like them...
@zipp4everyone263
@zipp4everyone263 7 лет назад
That breach is potentially lethal.
@sunday87
@sunday87 6 лет назад
I kind of dislike how they state something like "WPA2 was mathematically proven to be secure" and then something like "But it is not secure now", which makes it sound like a mathematic proof, in general, is not reliable. The mathematically proven part is still secure, the attack is about abusing a fail-safe (the retransmission of packet 3) that is not part of the mathematical description.
@ChaimS
@ChaimS 7 лет назад
Computerphile crossover!
@NF2K
@NF2K 6 лет назад
Great content as always and thanks for sharing. One tiny criticism of something I've noticed on at least a couple of videos: the audio sync is like a couple of seconds late on the scenes showing the working on paper (also see the GANs video for another example)
@AV1461
@AV1461 7 лет назад
So, the attacker or the Access Point sends Message3 continually to the client making it reset its encryption counter, which makes all encryption blocks be encrypted by the same random number of strings. So in the end all blocks are encrypted with the same number which provides for ample opportunities for brute forcing that number. I think I get it :D. And from what I've read in a review, the WPA2 stander specifies that the client should reset it's counter if it receives Message 3 again. So the krack is in the standard itself.
@meddylad
@meddylad 5 лет назад
Good job lads..... exactly how I would have explained it
@WayT0Aesthetic
@WayT0Aesthetic 7 лет назад
mike and the anime guy in one video.. didnt expect that :o
@onurberktore2979
@onurberktore2979 6 лет назад
Great channel but no subtitles,its so sad
@Reybinh
@Reybinh 7 лет назад
Wow. A crossover episode 😂
@rosselur
@rosselur 7 лет назад
I reacted to the part where he said it's a theoretical possibility to reach the maximum of a 128 bit number in this situation. I assume then that the starting number is randomized and arbitrary?
@1512832
@1512832 7 лет назад
The audio for the marker is desynced at 2:00.
@chuckmaddox6725
@chuckmaddox6725 5 лет назад
1:07 A wild Mike Pound appears
@Aryasvitkona
@Aryasvitkona 7 лет назад
So from what I understand this is only able to be done at close range, and only doable during the connection establishment. So if your computer is always on, and always connected to the WiFi, this can't be used against you. Am I correct?
@andreassjoberg3145
@andreassjoberg3145 6 лет назад
To keep this secure, the entire 4-step handshake have to start over from 0 with a NEW random key exchange before trying to connect again, rather than trying to continue the login...
@nickolas474
@nickolas474 6 лет назад
Supposing you use a compromised wifi network to connect to a VPN, is the VPN encryption secure or is also compromised?
@eben4707
@eben4707 7 лет назад
Forgive me if this is a really dumb question, but I am honestly a bit confused. Does the malicious person trying to intercept data need to be physically close by (i.e. within range of your wifi) to get in and intercept data, or is this the kind of thing that can be done remotely somehow?
@HenrikWichert
@HenrikWichert 7 лет назад
Yes
@benjaminbrady2385
@benjaminbrady2385 6 лет назад
Top 10 anime crossovers
@tomascanevaro4292
@tomascanevaro4292 7 лет назад
I love your videos guys!") DROP ALL TABLES
@lels3618
@lels3618 7 лет назад
Tomas Canevaro '; UPDATE comments SET content = '' WHERE content LIKE '%")%'
@justawatchin2
@justawatchin2 7 лет назад
I don't know if it's you or RU-vid, but I'm only getting HD options (1080p and 1440p). On my regular laptop these don't load properly - I always switch to something lower - so I'm unable to watch this video.
@dreamyrhodes
@dreamyrhodes 7 лет назад
I always thought WPA2 uses some kind of public key to handshake the encryption? Why don't they why so complicated and errorprone?
@An.Individual
@An.Individual 3 года назад
2:16 why have they edited out message 3?
@kyleringler4213
@kyleringler4213 7 лет назад
So..man in the middle attack.
@kurt44mg42
@kurt44mg42 7 лет назад
Not really. More like a "man somewhere in the RF vicinity" attack.
@Rocknoob49
@Rocknoob49 7 лет назад
Man in the middle takes the message and sends something different instead right? In this case here the attacker doesnt need to alter the message, just cause it to repeat multiple times to be able to decrypt the key
@kurt44mg42
@kurt44mg42 7 лет назад
Yes, some form of replay attack somewhat conceptually similar to WEP cracking.
@krillin6
@krillin6 7 лет назад
Kyle Ringler Yes, but not all mitm are the same. Also might be categorized as communication poisoning, also.
@Calvinux
@Calvinux 7 лет назад
Going to do a video on ROCA aswell?
@tekk9995
@tekk9995 7 лет назад
Hé nice, Amiga 1000 in the back :) \0/
Далее
Password Cracking - Computerphile
20:20
Просмотров 3,4 млн
Wana Decrypt0r (Wanacry Ransomware) - Computerphile
15:19
ДЖЕФ  ЕЩЕ ПОМОГАЕТ!
09:37
Просмотров 480 тыс.
How Strong is Tin Foil? 💪
00:26
Просмотров 55 млн
How WanaCrypt Encrypts Your Files - Computerphile
17:22
How NOT to Store Passwords! - Computerphile
9:24
Просмотров 2,3 млн
How to Choose a Password - Computerphile
11:33
Просмотров 1,2 млн
Cookie Stealing - Computerphile
16:12
Просмотров 1,1 млн
Key Exchange Problems - Computerphile
9:18
Просмотров 356 тыс.
End to End Encryption (E2EE) - Computerphile
8:12
Просмотров 747 тыс.
2FA: Two Factor Authentication - Computerphile
12:34
Просмотров 502 тыс.