TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Framing Frames: Bypassing wi-fi encryption by manipulating transmit queues

155 点作者 sipofwater超过 1 年前

12 条评论

linuxlizard超过 1 年前
I swear Mathy Vanhoef has dedicated his life to making my life miserable. Every time he finds these wifi security problems, we get to spend weeks/months integrating and testing vendor patches.
评论 #39131096 未加载
评论 #39134474 未加载
3abiton超过 1 年前
&gt; This exploits a design flaw in hotspot-like networks and allows the attacker to force an access points to encrypt yet to be queued frames using an adversary-chosen key, thereby bypassing Wi-Fi encryption entirely. Our attacks have a widespread impact as they affect various devices and operating systems (Linux, FreeBSD, iOS, and Android) and because they can be used to hijack TCP connections or intercept client and web traffic<p>Interesting approach, that seems to be limited to Hotspots or am I getting this wrong?
评论 #39129203 未加载
dataflow超过 1 年前
For the life of me I don&#x27;t understand either of these:<p>- Why, after so many darn versions of Wi-Fi security standards, we still have attacks that just bypass encryption entirely. How do these not get caught during the design&#x2F;implementation with so many people studying the specs for decades?<p>- Why 99% of end-users should even care about these issues from a security standpoint, given they already have https and such (because the transport is already assumed to be untrusted), and given that people have been connecting to &quot;unsecured&quot; networks for decades now, without the sky falling. Is the added security of each version of WPA even relevant to normal people?
评论 #39131799 未加载
评论 #39132220 未加载
评论 #39137040 未加载
评论 #39131781 未加载
fulafel超过 1 年前
Wireless stuff has some bad times recently - bluetooth keyboard injection: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38661182">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38661182</a>
bell-cot超过 1 年前
Security-wise, Wi-Fi has always been a steaming heap. And probably always will be.
评论 #39130587 未加载
评论 #39130958 未加载
评论 #39130284 未加载
tmd83超过 1 年前
So if the underlying connection isn&#x27;t encrypted (like https) it essentially became open to anyone of the same network?
评论 #39129837 未加载
dboreham超过 1 年前
I thought we didn&#x27;t rely on WiFi encryption since...long ago? Most hotspots don&#x27;t even have encryption enabled.
rjaco31超过 1 年前
It&#x27;s written in the paper that the PoC code has been published. But there is no link anywhere?
评论 #39131273 未加载
riedel超过 1 年前
Maybe one should note that this was reported 9 month ago: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35353264">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35353264</a>
scrps超过 1 年前
Wi-Fi Alliance: Fixed management frame deauth in WPA3.<p>Also Wi-Fi Alliance: Refactored(-ish) deauth to unprotected power-save bit.
londons_explore超过 1 年前
I can&#x27;t quite see how this can be a spec bug...<p>I mean, why would client A be able to change the key used for communicating with client B?<p>Does this rely on some kind of confusion between clients? ie. force a client to disconnect, then the attacker connects using its mac address, and receives all the queued frames?
评论 #39128892 未加载
sipofwater超过 1 年前
Source: &quot;Interesting Links&quot; at <a href="https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;termux&#x2F;comments&#x2F;19573gg&#x2F;encryption_decryption_android_11_operating_system&#x2F;" rel="nofollow">https:&#x2F;&#x2F;old.reddit.com&#x2F;r&#x2F;termux&#x2F;comments&#x2F;19573gg&#x2F;encryption_...</a> (&quot;Encryption, Decryption, Android 11 Operating System, Termux, And proot-distro Using Alpine Linux minirootfs: cryptsetup v2.6.1 And LUKS&quot;, old.reddit.com&#x2F;r&#x2F;termux&#x2F;comments&#x2F;19573gg&#x2F;encryption_decryption_android_11_operating_system&#x2F;).
评论 #39135363 未加载
评论 #39129273 未加载