Start Updating old phones

Updating old phones

For more information about specific products, consult the database of CERT/CC, or contact your vendor.

Our main attack is against the 4-way handshake of the WPA2 protocol.

In any case, the following demonstration highlights the type of information that an attacker can obtain when performing key reinstallation attacks against protected Wi-Fi networks: Our attack is not limited to recovering login credentials (i.e. In general, any data or information that the victim transmits can be decrypted.

Additionally, depending on the device being used and the network setup, it is also possible to decrypt data sent towards the victim (e.g. Although websites or apps may use HTTPS as an additional layer of protection, we warn that this extra protection can (still) be bypassed in a worrying number of situations.

In this demonstration, the attacker is able to decrypt all data that the victim transmits.