官术网_书友最值得收藏!

Security protocol attacks

Many security protocols can sustain attacks against vulnerabilities introduced either in the protocol design (specification), implementation, and even configuration stages (in which different, viable protocol options are set). For example, researchers found while testing a ZigBee-based consumer IoT implementation that the protocol was designed for easy setup and usage but lacked configuration possibilities for security and performed vulnerable device pairing procedures. These procedures allow external parties to sniff the exchanged network key during the ZigBee pairing transaction and gain control of the ZigBee device. Understanding the limitations of a chosen protocol is absolutely critical to determining what additional layered security controls must be put in place to keep the system secure (https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf).

Massively deployed, too, is the WPA2 (Wi-Fi protected access) cryptographic protocol built into almost every home and business wireless router. In late 2017, this protocol was found, by security researcher, Mathy Vanhoef, to be vulnerable to a class of attack called a key reinstallation attack, wherein the attacker forces the device (in this case, in perfect accordance with the standardized protocol) to reuse a cryptographic key (see https://www.krackattacks.com). Given the ubiquity of 802.11, millions of devices needed to be patched for the vulnerability and many remain vulnerable to this day. The attack allows the victim's traffic to be decrypted by the attacker; injection of malicious traffic into the network is also feasible.

主站蜘蛛池模板: 富民县| 和政县| 洪雅县| 措勤县| 西畴县| 嘉善县| 正安县| 通化市| 咸丰县| 府谷县| 伊宁市| 阿巴嘎旗| 新干县| 共和县| 博野县| 遵化市| 天津市| 吉林省| 贵港市| 浙江省| 大城县| 土默特左旗| 怀远县| 北流市| 德清县| 普安县| 古交市| 商丘市| 霍山县| 隆德县| 崇阳县| 呼伦贝尔市| 康定县| 蒙城县| 莎车县| 穆棱市| 澎湖县| 永嘉县| 永德县| 乌苏市| 庐江县|