WPA2 was kracked because it was based on a closed standard that you needed to pay to read

Interesting, thanks for sharing, that was a better writeup.

from that writeup:

one of the primary flawed pieces required for the exploit isn’t even in the spec…

ironically, it was an often reused bit of common shared pseudo code (open source) implementation of the handshake state machine, which resets the counter in an unsafe way that is the basis for this exploit.

also the exploit is worst on android where replaying message #3 actually sets an all-zero key, and that code implementation has been completely open to scrutiny for free by anyone.

so um yeah…the minimal amount of investigation pretty much eliminates the conclusion in the title.

12 Likes