官术网_书友最值得收藏!

Security protocol attacks

Many security protocols can sustain attacks against vulnerabilities introduced either in the protocol design (specification), implementation, and even configuration stages (in which different, viable protocol options are set). For example, researchers found while testing a ZigBee-based consumer IoT implementation that the protocol was designed for easy setup and usage but lacked configuration possibilities for security and performed vulnerable device pairing procedures. These procedures allow external parties to sniff the exchanged network key during the ZigBee pairing transaction and gain control of the ZigBee device. Understanding the limitations of a chosen protocol is absolutely critical to determining what additional layered security controls must be put in place to keep the system secure (https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf).

Massively deployed, too, is the WPA2 (Wi-Fi protected access) cryptographic protocol built into almost every home and business wireless router. In late 2017, this protocol was found, by security researcher, Mathy Vanhoef, to be vulnerable to a class of attack called a key reinstallation attack, wherein the attacker forces the device (in this case, in perfect accordance with the standardized protocol) to reuse a cryptographic key (see https://www.krackattacks.com). Given the ubiquity of 802.11, millions of devices needed to be patched for the vulnerability and many remain vulnerable to this day. The attack allows the victim's traffic to be decrypted by the attacker; injection of malicious traffic into the network is also feasible.

主站蜘蛛池模板: 临桂县| 儋州市| 全南县| 邓州市| 怀宁县| 吉安县| 清水河县| 延安市| 同仁县| 香格里拉县| 太原市| 崇礼县| 台中县| 海伦市| 社会| 宁陕县| 北流市| 密山市| 金川县| 翁牛特旗| 桑植县| 平泉县| 常德市| 尖扎县| 应用必备| 武平县| 莱芜市| 惠来县| 华容县| 临夏县| 西丰县| 宁海县| 长海县| 长岛县| 罗定市| 天全县| 新营市| 永仁县| 武宣县| 南部县| 五莲县|