-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathinitTexCode.txt
33 lines (24 loc) · 1.19 KB
/
initTexCode.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
%TODO:
%Edit description
%Edit title format
%Add exact time
\documentclass{article}
\usepackage[utf8]{inputenc}
\title{KrackPlus vulnerability report}
\centering
\begin{document}
\maketitle
\begin{center}
\textbf{Summary}
\end{center}
\begin{flushleft}
\noindent An adversary can attempt to exploit a vulnerability in the 4-way handshake in WPA2 through jamming and resending the third part of the handshake. This report details whether any of the scanned Android or Linux devices are vulnerable to the pairwise or group version of key reinstallation attacks (KRACK). \newline
\noindent The first column contains the mac-addresses of the clients that were scanned. The second and third colums detail whether a device was vulnerable to either the pairwise or group version of KRACK. \newline
\noindent Pairwise: client seems vulnerable to pairwise key reinstallation in the 4-way handshake (using standard attack).\newline
\noindent Group: client is vulnerable to group key reinstallations in the 4-way handshake (or client accepts replayed broadcast frames)\newline \newline
\end{flushleft}
\begin{center}
\textbf{Device results}
\end{center}
\hspace{41mm} None \hspace{18mm} Parwise \hspace{16mm} Group
\newline