Krack Attacks (WiFi WPA2 Vulnerability) - Computerphile

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 พ.ค. 2024
  • Secure WiFi is broken - Dr Mike Pound & Dr Steve Bagley on the Krack Attack discovered by researchers in Belgium.
    Mike's description of crib dragging relates to Professor Brailsford's discussions of WWII Lorenz cipher cracking:
    Fishy Codes: • Fishy Codes: Bletchley...
    Zig Zag Decryption: • Zig Zag Decryption - C...
    IBM PC: • IBM PC - Computerphile
    Password Cracking: • Password Cracking - Co...
    The researchers who discovered the vulnerability: bit.ly/C_CrackAttack
    / computerphile
    / computer_phile
    This video was filmed and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscomputer
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

ความคิดเห็น • 529

  • @anothergol
    @anothergol 6 ปีที่แล้ว +528

    at last, Philip Seymour Hoffman & Tobey Maguire in the same movie

  • @quimlast7180
    @quimlast7180 6 ปีที่แล้ว +372

    Crossover episode? Can't wait for tournament arc

    • @anousenic
      @anousenic 6 ปีที่แล้ว +19

      But is it canon?

    • @justinward3679
      @justinward3679 6 ปีที่แล้ว +14

      AnotherUselessNick No this is filler

    • @rykehuss3435
      @rykehuss3435 6 ปีที่แล้ว +12

      did someone say TOURNAMEEENT AAAAAARC

    • @iamwhatitorture6072
      @iamwhatitorture6072 6 ปีที่แล้ว +2

      Rykehuss HYYYYYYYYYPE (Rocket starts)

    • @charleshizer7118
      @charleshizer7118 6 ปีที่แล้ว

      Quim Last n

  • @StepanStolyarov
    @StepanStolyarov 6 ปีที่แล้ว +582

    he krac but he also attac

    • @NoName-sb4vu
      @NoName-sb4vu 6 ปีที่แล้ว +16

      Stepan Stolyarov but most importantly nonce! 😂

    • @JetJockey87
      @JetJockey87 6 ปีที่แล้ว +3

      Clap clap

    • @EgoShredder
      @EgoShredder 6 ปีที่แล้ว +3

      He's got a lot upstairs.....it was an Atic Atac.

    • @subject2749
      @subject2749 5 ปีที่แล้ว

      Perfect profile pic for it as well

  • @coolien35
    @coolien35 6 ปีที่แล้ว +124

    I wish these guys were my professors!

    • @expectnull
      @expectnull 6 ปีที่แล้ว +6

      Especially both of them together; discussing

    • @DaVince21
      @DaVince21 6 ปีที่แล้ว +2

      They are for these brief 10 minutes!

    • @zaba67
      @zaba67 3 ปีที่แล้ว +1

      Study at Nottingham

  • @BUSTERmetalJP
    @BUSTERmetalJP 6 ปีที่แล้ว +57

    the blond guy looks like pulled out directly from a 90s film...

  • @drowningcows7631
    @drowningcows7631 6 ปีที่แล้ว +6

    i KNEW you'd have a video for this straight away. I woke up, checked my phone, saw this and thought 'can't wait to see the computerphile video about this. I love your videos

  • @sebastianelytron8450
    @sebastianelytron8450 6 ปีที่แล้ว +38

    A Computerphile topical video?? Yes please!

    • @jeffirwin7862
      @jeffirwin7862 6 ปีที่แล้ว +7

      A Pound/Bagley crossover?? Yes please!

    • @benjaminbrady2385
      @benjaminbrady2385 6 ปีที่แล้ว +4

      A yes please chain?? Yes please

  • @JamEngulfer
    @JamEngulfer 6 ปีที่แล้ว +201

    Damn that was fast

    • @pluto8404
      @pluto8404 6 ปีที่แล้ว +2

      A little too fast...

    • @bargh70
      @bargh70 6 ปีที่แล้ว +6

      Something tells me everybody got a memo before the media and common people.

    • @antoncid5044
      @antoncid5044 6 ปีที่แล้ว +1

      Considering Windows released an update to patch this before the media published anything, yeah I would say so. It's common place for the tech industry to find out first and have a window to fix it before the news runs with it. Once the news publishes it there is the risk of the attacks becoming more widespread.

  • @Remmes
    @Remmes 6 ปีที่แล้ว +158

    It was found by 1 person but his supervisor is added under an honorary authorship.

    • @jeffirwin7862
      @jeffirwin7862 6 ปีที่แล้ว +79

      What about his hypervisor?

    • @sundhaug92
      @sundhaug92 6 ปีที่แล้ว +102

      The hypervisor was virtually included ;)

    • @NicholasMarkovich
      @NicholasMarkovich 6 ปีที่แล้ว +7

      oh no you didn't.

    • @jennifergrey5546
      @jennifergrey5546 6 ปีที่แล้ว

      KRACK attacks are new and dangerous, but they can be stopped with WiFi encryption provided by PureVPN.

    • @heephstan
      @heephstan 6 ปีที่แล้ว +24

      This is a joke right? Advertising like this?

  • @zakunknown9737
    @zakunknown9737 6 ปีที่แล้ว

    I really enjoy the videos you guys make. been paid to program for 6 years and still enjoy this channel

  • @kentvandervelden
    @kentvandervelden 6 ปีที่แล้ว

    Fascinating video. Thanks for making this so quickly after the announcement.

  • @UntouchedWagons
    @UntouchedWagons 6 ปีที่แล้ว +1

    Dr. Pound and Dr. Bagley, 2 of my 3 favourite speakers on Computerphile

  • @xplinux22
    @xplinux22 6 ปีที่แล้ว

    Excellent summary of the attack! Straight and to-the-point, with helpful tidbits along the way.

  • @kebman
    @kebman 5 ปีที่แล้ว

    You guys are the best! Thank you for all this golden goodness of computerphility.

  • @NoNameAtAll2
    @NoNameAtAll2 6 ปีที่แล้ว +7

    Every time I see Mark, I know that something interesting is going to happen

  • @MYLFOOD
    @MYLFOOD 6 ปีที่แล้ว

    This is awesome stuff. I'm glad I found this channel.

  • @katrinal353
    @katrinal353 6 ปีที่แล้ว +20

    After seeing these videos on it, and reading the paper, that attack seems soooo profound! You see exceptionally simple exploits and blatant lack of security in implementations of many things, but it amazes me that a protocol such as this, has such a basic vulnerability that's part of it's standard. Ironically, implementations that disregard the standard are more secure... That's

    • @KuraIthys
      @KuraIthys 6 ปีที่แล้ว +1

      Well, the systems most at risk are those which tried to patch a vulnerability to a different, less dangerous problem.
      Ironically fixing one hole created a much bigger one.
      Perhaps not following the spec was intentional though.
      If you sense a potential problem with the official implementation you may just choose not to follow the suspect part of the spec.
      Tou don't nessesarily need to know exactly what the problem is either.
      A vague notion that part of the spec has an issue might be enough to avoid the issue almost accidentally...

    • @pij3333
      @pij3333 6 ปีที่แล้ว +2

      I've heard that this vulnerability is not specified in the WPA2 standard, it's just a non-specified part of the WPA2 standard that is most commonly set up in an exploitable way.

    • @kejoki8123
      @kejoki8123 6 ปีที่แล้ว +2

      If there are two ways to do something, and one of them leads to disaster, some lazy son-of-a-gun will make that one the standard way of doing it.

    • @DFX2KX
      @DFX2KX 6 ปีที่แล้ว +1

      My Computer Hardware & Networking teacher said it best (though it wasn't about WiFi, it was about disk encryption): The street between the Standard and the Implementation is mostly potholes.

  • @TheAndres411
    @TheAndres411 6 ปีที่แล้ว +736

    Top 10 anime crossovers..

    • @benjaminbrady2385
      @benjaminbrady2385 6 ปีที่แล้ว +4

      kek

    • @kevinpacheco8169
      @kevinpacheco8169 6 ปีที่แล้ว +17

      Mike is OP

    • @stadodo
      @stadodo 6 ปีที่แล้ว +12

      just wanted to say this is a great comment

    • @minimalmo
      @minimalmo 6 ปีที่แล้ว +1

      What!?

    • @surferriness
      @surferriness 6 ปีที่แล้ว +12

      Don't say you understand Computerphile if you don't even know the lore..

  • @rudilapa6569
    @rudilapa6569 6 ปีที่แล้ว +65

    This sounds similar to the way enigma was broken: forcing reuse of the same key sequence points against varied data (suspected) to get the key back. (Especially the crib dragging, as with the weather reports that were expected in some transmissions.) - ?

    • @rlewis1946
      @rlewis1946 6 ปีที่แล้ว +8

      If only Allan Turing were alive today! He would be in this discussion, I am sure.
      Yes, I remember reading about those damn weather reports!
      RL

    • @maurocolombo2173
      @maurocolombo2173 6 ปีที่แล้ว +2

      Actually it reminds me of Prof. Brailsford video about the Lorentz machine...

    • @davepusey
      @davepusey 6 ปีที่แล้ว

      Having seen the film Imitation Game, I did think this sounded somewhat familiar.

    • @clintellis7755
      @clintellis7755 4 ปีที่แล้ว

      I thought WAP2 was supposed to stop traffic and reset the key if more than one TKIP / MIC failure occured within 60 seconds. Wouldn't that limit brute force attacks?

  • @Adywsn
    @Adywsn 6 ปีที่แล้ว +1

    As soon as you introduced Mike into the video I was like 'aye, Mike's here :D, weird seeing two of you in 1 video' love it though!

  • @RobertT1999
    @RobertT1999 6 ปีที่แล้ว

    Mike Pound and Steve Bagley. An exciting day this will be for me.

  • @ZXGuesser
    @ZXGuesser 6 ปีที่แล้ว +225

    "it needs the be patched, it'll be patched, and then we can all go back to using wifi". Unless we have an android phone, or use wifi repeater hardware that will never see a firmware update, or etc etc. sigh. :(

    • @Selektionsfaktor
      @Selektionsfaktor 6 ปีที่แล้ว +37

      ZXGuesser This sadly is true in way too many cases. The amount of smartphones with Marshmallow or lower is staggering.

    • @ZXGuesser
      @ZXGuesser 6 ปีที่แล้ว +115

      Thank goodness no-one was ever stupid enough to put wifi in cheap consumer electronics and household appliances that couldn't be patched to fix things like this. Then we'd have really been in trouble...

    • @Phroggster
      @Phroggster 6 ปีที่แล้ว +38

      Selek Somewhat ironically, pre-Marshmallow devices are better off than Marshmallow or newer. This is due to a fix for a prior bug that went in to Android 6, and is what introduced the worst-possible-outcome zero-nonce when enduring KRACK.

    • @KuraIthys
      @KuraIthys 6 ปีที่แล้ว +37

      Hey, at least this one CAN be patched.
      There's an exploit in the USB protocol relating to plug and play that literally cannot be patched because it would break USB.
      Leave in exploit, or stop using USB. Those are your options...

    • @meathook3000
      @meathook3000 6 ปีที่แล้ว +3

      Android phones suck. [shots fired]

  • @Furiends
    @Furiends 6 ปีที่แล้ว +8

    Theres a bit of a mistake near the end. The brute forcing methods described in this video apply to Windows and MacOS because keys are reused. That means with some amount of known information the attacker can guess the key. wpa_supplicant used on Linux and Android clears its key resulting in a zeroed-key which means no brute forcing is necessarily because now the key is known. While this is what's demonstrated by the security researcher it would be trivial to go a bit further and compare known information to repeated used keys and then guess the key making Windows and MacOS susceptible so to say "on certain operating systems its relatively benign" is incorrect.
    Forgery should be possible on any unpatched system that accepts the use of TKIP. So the main other feature of zero-key: forgery is still possible on systems not affected by zero-key like Windows and MacOS. Since both of these OSes happily accept TKIP and most any fairly new router is set to use either TKIP or CCMP (AES) then there is nothing protecting these systems against forgery once keys are guessed.

  • @code-dredd
    @code-dredd 6 ปีที่แล้ว +143

    If I could have a penny for every NONCE that was used _only once_ , I would have the _same_ penny.

    • @richb313
      @richb313 6 ปีที่แล้ว +3

      Not really. Odds are the very same number has been used but maybe not by you.

    • @code-dredd
      @code-dredd 6 ปีที่แล้ว +5

      richb313 Don't force my hand; I don't want to kill the joke 😒

    • @panda4247
      @panda4247 6 ปีที่แล้ว +4

      How many Germans does it take to change the light bulb?
      One. Because they are effective and have no sense of humor.

    •  5 ปีที่แล้ว

      eyyy this comment richer than my self esteem.

  • @AbhishekZambre
    @AbhishekZambre 6 ปีที่แล้ว +22

    Was waiting for your video on this.

    • @AbhishekZambre
      @AbhishekZambre 6 ปีที่แล้ว +1

      Yeah, probably one of those vulnerabilities which many institutions knew about it, was exploiting it for years, and didn't revealed it to anyone.

  • @nO_d3N1AL
    @nO_d3N1AL 6 ปีที่แล้ว

    Wow, it's amazing that this exploit wasn't found earlier!

  • @DarkVortex97
    @DarkVortex97 6 ปีที่แล้ว +12

    This is the superhero team up movie I've been waiting for. No Justice League for me.

  • @AD34534
    @AD34534 6 ปีที่แล้ว +146

    Ethernet Master Race

    • @Cleric775
      @Cleric775 6 ปีที่แล้ว +15

      *Category 7* .
      Extra - shielded and buried underground for least possible chance of emission.

    • @ronarprefect7709
      @ronarprefect7709 5 ปีที่แล้ว +1

      I like the cut of your jib.

    • @sanderhansen7036
      @sanderhansen7036 5 ปีที่แล้ว

      Hey Dave, is it you who is vocal on the SDE legends kickstarter?

    • @blackneos940
      @blackneos940 4 ปีที่แล้ว

      @@Cleric775 And DON'T FORGET THE LEAD. :D

  • @alemutasa6189
    @alemutasa6189 6 ปีที่แล้ว

    Ohhh yeah, I was waiting for this

  • @mult1vac
    @mult1vac 4 ปีที่แล้ว +17

    "the belgian university" *giggles* I know belgium is small but we really have a few universities :)

    • @simeondermaats
      @simeondermaats 2 ปีที่แล้ว +2

      't Is waarschijnlijk de KU Leuven geweest, die chappies zijn niet normaal wanneer het aankomt op cryptografie lijkt het wel

  • @mohammadslim8389
    @mohammadslim8389 2 ปีที่แล้ว

    Well done Victor!

  • @thatoseluku4276
    @thatoseluku4276 5 ปีที่แล้ว

    I never understand what they're on about but I still watch

  • @SuperLanyard
    @SuperLanyard 6 ปีที่แล้ว

    Steve, Great show! Sometime could you do a show on Hardware you personally use. Thanks.

  • @gamersforever1585
    @gamersforever1585 6 ปีที่แล้ว

    I love this channel and I'll be happy if You add subtitles

  • @themeeman
    @themeeman 6 ปีที่แล้ว

    This video and the comments are gold

  • @suicidalbanananana
    @suicidalbanananana 6 ปีที่แล้ว

    Nice, ty for the clearer explanation then yesterdays pdf :D

  • @grn1
    @grn1 3 ปีที่แล้ว

    When they were talking about XORing the results I immediately thought about Prof. B's videos on WWII Lorenz cracking and lo and behold they did mention it in the description. Since no one reads the description I figured I'd post this anyway.

  • @encomium23
    @encomium23 6 ปีที่แล้ว

    Love the dot matrix printer paper for note taking!! Gold!

  • @ducky1086
    @ducky1086 4 ปีที่แล้ว

    Mike's introduction was the best

  • @c477um11
    @c477um11 6 ปีที่แล้ว +1

    It could be a totally innocent and genuine thing, but I had captions on and lost it at Mikes first line introduing him as Dr Pound.

  • @daft_punker
    @daft_punker 6 ปีที่แล้ว

    Mike!!! The legend!

  • @r00tb33
    @r00tb33 6 ปีที่แล้ว +1

    I'm an electronics and telecom major it would be really great if you can make a playlist of all computer science and security videos from your channel and anyone would just skim through it anytime. I'm currently learning CS and the way you explain things it's really awesome but I always have to find videos related to the same topic like stack heap DS etc... and searching consumes a lot of time. Plz do the needful. Thanks!!

  • @raunakchhatwal5350
    @raunakchhatwal5350 6 ปีที่แล้ว +218

    You should’ve put Mike in the thumbnail for the views

    • @JamEngulfer
      @JamEngulfer 6 ปีที่แล้ว +39

      They did

    • @raunakchhatwal5350
      @raunakchhatwal5350 6 ปีที่แล้ว +8

      JamEngulfer then make it bigger. You barely see it

    • @Necessarius
      @Necessarius 6 ปีที่แล้ว +6

      Only Mike

    • @IpolsYoutube
      @IpolsYoutube 6 ปีที่แล้ว +41

      LordOfRandomStuff I assumed target audience of this channel is a bit better than what your comment implies tbh

    • @simontay4851
      @simontay4851 6 ปีที่แล้ว

      LordOfRandomStuff Mike IS in the thumbnail - on the left.

  • @matthewm.1598
    @matthewm.1598 6 ปีที่แล้ว

    I just saw an article about this and my first thought was, "This would be better explained by Computerphile...".

  • @NF2K
    @NF2K 6 ปีที่แล้ว

    Great content as always and thanks for sharing. One tiny criticism of something I've noticed on at least a couple of videos: the audio sync is like a couple of seconds late on the scenes showing the working on paper (also see the GANs video for another example)

  • @Cygnus0lor
    @Cygnus0lor 6 ปีที่แล้ว

    Thank God for computerphile. I was too lazy to read it...

  • @meddylad
    @meddylad 4 ปีที่แล้ว

    Good job lads..... exactly how I would have explained it

  • @Sinful_Citrus
    @Sinful_Citrus 6 ปีที่แล้ว

    Name a more iconic duo

  • @dyavanapellisujal1394
    @dyavanapellisujal1394 4 หลายเดือนก่อน

    the statement "in general its secure until yesterday"😂😂

  • @n8style
    @n8style 6 ปีที่แล้ว

    You know a video is serious when they bring in 2 experts

  • @AmxCsifier
    @AmxCsifier 6 ปีที่แล้ว

    Finally, a legit arrow in a thumbnail

  • @rosselur
    @rosselur 6 ปีที่แล้ว

    I reacted to the part where he said it's a theoretical possibility to reach the maximum of a 128 bit number in this situation. I assume then that the starting number is randomized and arbitrary?

  • @skate2late
    @skate2late 6 ปีที่แล้ว

    It just makes you think how many other exploits are sitting in the code of critical applications and haven't made it into the mainstream to be fixed yet

  • @gajbooks
    @gajbooks 6 ปีที่แล้ว

    Professor Brailsford approves of your guessed plaintext attack.

  • @Calvinux
    @Calvinux 6 ปีที่แล้ว

    Going to do a video on ROCA aswell?

  • @kkaustubhp
    @kkaustubhp 6 ปีที่แล้ว

    So basically to patch the problem we need to substitute the resetting of counters used for producing the key-stream, is it? would that be solving the problem or are there some other vulnerabilities in the protocols?

  • @robmckennie4203
    @robmckennie4203 6 ปีที่แล้ว

    Which is why end to end encryption is so important

  • @keiyakins
    @keiyakins 5 ปีที่แล้ว +1

    This seems pretty possible to mitigate by going "oops start over" and reconnecting from the start of you get a second message 3. Am I missing something?

  • @ericsbuds
    @ericsbuds 6 ปีที่แล้ว

    Thanks for the great explanation gentlemen!

  • @chrisspencer6502
    @chrisspencer6502 6 ปีที่แล้ว +1

    Was this proven after confirmed attacks I've seen videos talking about hand shake attacks for getting WiFi keys.

  • @technotux7835
    @technotux7835 6 ปีที่แล้ว

    to fix the vulnerability in Linux make sure to update package wpa_supplicant to version 1 : 2.6-11

  • @XenoContact
    @XenoContact 6 ปีที่แล้ว +1

    I read an entire article and now watched this lovely video but I still don't freaking get it. I am supposed to graduate as an IT engineer next year ! god damn it

  • @Aryasvitkona
    @Aryasvitkona 6 ปีที่แล้ว

    So from what I understand this is only able to be done at close range, and only doable during the connection establishment. So if your computer is always on, and always connected to the WiFi, this can't be used against you. Am I correct?

  • @gonzo_the_great1675
    @gonzo_the_great1675 ปีที่แล้ว

    And 5yrs later, we are all still using wpa2.

  • @amerkovac5247
    @amerkovac5247 6 ปีที่แล้ว

    So is patch gonna be WPA3, just something they'll do with WPA2 or something they'll do on phones or routers?

  • @KarjamP
    @KarjamP 6 ปีที่แล้ว

    It sounds like this to be a flaw mainly in the encryption used, itself, rather tha the Wi-Fi standard that used it. Hypethetically, it's still actually secure. It's just that the loopholes mentioned in this video causes the encryption mechanisms to break, thereby making the standard insecure.
    The flaw in this standard's more its reliance on its encryption, its ultimate trust, than anything else. If I were the standard's designer, I would've expected something like this to happen, and design the standard accordingly, for it's better wisdom not to rely on chance, but on one's expectency for something like this to happen.

  • @user4gent416
    @user4gent416 5 ปีที่แล้ว

    Awsome video

  • @dealloc
    @dealloc 6 ปีที่แล้ว

    Could you also make a video about ROCA (Return of Coppersmith’s Attack).

  • @AV1461
    @AV1461 6 ปีที่แล้ว

    So, someone doing an attack needs to be sitting within wifi range from you? Or control a device in such a position?
    This can't be done through the internet, right? Because it happens before tcp traffic.

  • @meltedcheese1908
    @meltedcheese1908 5 ปีที่แล้ว

    So if message 3 isn't sent the nonce and counter are going to be set back to 0 or whatever starting number but the same key stream is going to be used to encrypt the data?

  • @AV1461
    @AV1461 6 ปีที่แล้ว

    So, the attacker or the Access Point sends Message3 continually to the client making it reset its encryption counter, which makes all encryption blocks be encrypted by the same random number of strings. So in the end all blocks are encrypted with the same number which provides for ample opportunities for brute forcing that number.
    I think I get it :D.
    And from what I've read in a review, the WPA2 stander specifies that the client should reset it's counter if it receives Message 3 again. So the krack is in the standard itself.

  • @dreammfyre
    @dreammfyre 6 ปีที่แล้ว +15

    Worlds have collided.

    • @ykl1277
      @ykl1277 6 ปีที่แล้ว +5

      A Roadie I never thought they were in the same anime universe. Their character designs are so different.

  • @vwoxy1
    @vwoxy1 6 ปีที่แล้ว

    Would a fix for this be as simple as sending a new key with every message 3? Would the firmware updates be feasible?

  • @paulsutherland3813
    @paulsutherland3813 6 ปีที่แล้ว

    I don't know if it's you or TH-cam, but I'm only getting HD options (1080p and 1440p). On my regular laptop these don't load properly - I always switch to something lower - so I'm unable to watch this video.

  • @tomascanevaro4292
    @tomascanevaro4292 6 ปีที่แล้ว +10

    I love your videos guys!") DROP ALL TABLES

    • @lels3618
      @lels3618 6 ปีที่แล้ว +3

      Tomas Canevaro '; UPDATE comments SET content = '' WHERE content LIKE '%")%'

  • @codywilliams5029
    @codywilliams5029 6 ปีที่แล้ว

    Could you guys please do a video explaining Coin Hive, please?

  • @tekk9995
    @tekk9995 6 ปีที่แล้ว +3

    Hé nice, Amiga 1000 in the back :) \0/

  • @seheyt
    @seheyt 6 ปีที่แล้ว +1

    What happened to the audio? It sounds muffled with a mild hiss distort

  • @rkpetry
    @rkpetry 5 ปีที่แล้ว +1

    *_...puzzling your description: ►in a key-update-chain, one-use-keys may be used a second time to send the next key, if, ‘co-random’ not-otherwise-recognizable..._*

  • @eben4707
    @eben4707 6 ปีที่แล้ว +2

    Forgive me if this is a really dumb question, but I am honestly a bit confused. Does the malicious person trying to intercept data need to be physically close by (i.e. within range of your wifi) to get in and intercept data, or is this the kind of thing that can be done remotely somehow?

  • @jaydenritchie1992
    @jaydenritchie1992 ปีที่แล้ว

    yer but you have access/connection to the wifi/network or are you saying that if group key update is set to zero and every authorised user has a certificate that your unable to capture anything relevant/security breach?, if you have access surely you could spoof a mac address and modify frame size to force packet loss and retransfer or something similar? its when you don't have access thats the hard part for hackers or the easy bit for poeple trying to secure their networks

  • @ChaimS
    @ChaimS 6 ปีที่แล้ว

    Computerphile crossover!

  • @gwenynorisu6883
    @gwenynorisu6883 5 ปีที่แล้ว

    Guess that's why he's still got the Mega STe and Amiga 2000 on standby in the background. Good luck hacking _those._

  • @NeilRoy
    @NeilRoy 6 ปีที่แล้ว +10

    Windows... is safer... well, I lived long enough to hear that. I can die now! ;)

  • @aytankamienny1051
    @aytankamienny1051 6 ปีที่แล้ว

    Just about all applications or websites which may contain interesting data already use encryption (https,sftp,ssh) on the application side ,so I don't see why this is such a big deal. Any ideas?

  • @Reybinh
    @Reybinh 6 ปีที่แล้ว

    Wow. A crossover episode 😂

  • @macieks3604
    @macieks3604 6 ปีที่แล้ว

    Ok, one thing I would really want to know but nobody is very clear about is this; If I patched my home router but still use ios7 devices on my home network and only on my home network are these connection safe, provided I don't go out to use public networks. Would really appreciate, getting some answers.

  • @fabiii7044
    @fabiii7044 6 ปีที่แล้ว

    i fkn love mike

  • @user-pj5oi7nk1e
    @user-pj5oi7nk1e 6 ปีที่แล้ว +5

    In short.. During WW2 German Enigma failed before it was sending weather info and time at the beginning of the message using the encrypted codes.. If you knew those, you could easily decrypt any message.. Same concept

    • @nathansmith3608
      @nathansmith3608 6 ปีที่แล้ว +2

      Win Dias word, it was hella easy to decrypt enigma. u just had to write up an algorithm, translate it into base 5 instructions implemented as physical wiring connections on a high voltage electro-mechanical early prototype computer, then piece of cake from there
      It definitely made it easier, but easy is probably saying too much. Also, I think the fact of characters never looping back to themselves was probably a greater vulnerability

  • @marshallbrett7591
    @marshallbrett7591 6 ปีที่แล้ว +3

    Wasn't an attack like this always possible using software like LOIC to disrupt the connection and listen to the new handshake?

    • @Baigle1
      @Baigle1 6 ปีที่แล้ว +2

      no, that captures the handshake for password cracking via rainbow/statistical/brute/hybrid methods
      this is a technicality of how tkip works to use counters in increasing encryption complexity
      imagine knowing what the psrng would generate as someone tries to log into facebook next for their session key, you could then assume their generated session key and mess with their account without needing to know their password even though its far more complicated than just discovering their password.

  • @nickolas474
    @nickolas474 6 ปีที่แล้ว

    Supposing you use a compromised wifi network to connect to a VPN, is the VPN encryption secure or is also compromised?

  • @ragnkja
    @ragnkja 6 ปีที่แล้ว

    This isn't the first time a key was broken because someone sent two or more similar messages using the same key. In fact, that was how the Lorenz Machine was broken during WW2.

  • @limpep
    @limpep 6 ปีที่แล้ว

    Do basically you need physical access to the access point I device.

  • @1512832
    @1512832 6 ปีที่แล้ว

    The audio for the marker is desynced at 2:00.

  • @gloverelaxis
    @gloverelaxis 5 ปีที่แล้ว

    CROSSOVER EVENT!!

  • @monkingflame9493
    @monkingflame9493 6 ปีที่แล้ว

    But to krack my wifi encription the atacker would still have to be in range of my wifi signal right? so there is a some what low risk situation if I´m in a quiet sub urban area without a lot of strangers where i would most likely notice a black van sitting infront of my house running the engine sometimes to power the battery. I mean i can´t get attacked by someone sitting in London while i´m loging in via wifi in oxford for example right?

  • @philippetrov4881
    @philippetrov4881 6 ปีที่แล้ว

    Looks like it's something like the "Zig Zag" video on the same channel which was published years ago...

  • @onurberktore2979
    @onurberktore2979 5 ปีที่แล้ว

    Great channel but no subtitles,its so sad

  • @gianluca.g
    @gianluca.g 6 ปีที่แล้ว

    question for you guys: the whitepaper of the exploit states that this is an exploit on the actual protocol not the specific implementation. However, I fail to understand why it is so. The AP doesn't receive M4 so it resends M3, that's not modeled on the formal proof of correctness, the AP should start all over again resending M1 like if the previous transaction never happened. Resending M3 until I get M4 sounds like an implementation flaw...

  • @paulmann1289
    @paulmann1289 6 ปีที่แล้ว +29

    Microsoft has already released a patch for windows.

    • @vpctech
      @vpctech 6 ปีที่แล้ว +2

      I dunno. But good question. Another one : do you need to update your Wifi drivers?.

    • @DaVince21
      @DaVince21 6 ปีที่แล้ว +6

      Patches for Linux have been pushed out too. Developers are really on top of this problem!

    • @thinkfloyd2594
      @thinkfloyd2594 6 ปีที่แล้ว

      Exactly; the only one Microsoft wants pilfering your privacy is Microsoft.