<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: KRACK Attack in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/KRACK-Attack/m-p/7602#M930</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In terms of specific products that may have potentially been impacted by KRACK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120938" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120938"&gt;Check Point response to WPA2 Key Reinstallation Attacks (KRACK)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More general commentary is forthcoming.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Oct 2017 19:32:28 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-10-16T19:32:28Z</dc:date>
    <item>
      <title>KRACK Attack</title>
      <link>https://community.checkpoint.com/t5/General-Topics/KRACK-Attack/m-p/7600#M928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As we are living the "fallout" from the recently disclosed KRACK (Key Reinstallation AttaCK) vulnerabilities, I would like to know if anyone has any additional information or insights about it and also what Check Point has to say about it...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;KRACK is an attack that targets the WPA2 (Wi-Fi Security Protocol) 4-way handshake and allows the attacker to do many nasty things like MITM, SSL strip, inject malicious data into communications, etc. The big issue here is that almost every implementation of WPA2 is affected, so all(most)&amp;nbsp;of our Wi-Fi enabled devices (including our loved IoT) are&amp;nbsp;at risk.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Details about the KRACK (official website):&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://www.krackattacks.com/" title="https://www.krackattacks.com/"&gt;KRACK Attacks: Breaking WPA2&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;POC Video:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://www.youtube.com/watch?time_continue=265&amp;amp;v=Oh4WURZoR98" title="https://www.youtube.com/watch?time_continue=265&amp;amp;v=Oh4WURZoR98"&gt;KRACK Attacks: Bypassing WPA2 against Android and Linux - YouTube&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any additional thoughts here are welcome, including advisories about mitigations and what to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Oct 2017 18:06:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/KRACK-Attack/m-p/7600#M928</guid>
      <dc:creator>Fabian-Antunes</dc:creator>
      <dc:date>2017-10-16T18:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: KRACK Attack</title>
      <link>https://community.checkpoint.com/t5/General-Topics/KRACK-Attack/m-p/7601#M929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are planning some communications around this topic...stay tuned &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Oct 2017 18:37:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/KRACK-Attack/m-p/7601#M929</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-16T18:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: KRACK Attack</title>
      <link>https://community.checkpoint.com/t5/General-Topics/KRACK-Attack/m-p/7602#M930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In terms of specific products that may have potentially been impacted by KRACK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120938" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120938"&gt;Check Point response to WPA2 Key Reinstallation Attacks (KRACK)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More general commentary is forthcoming.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Oct 2017 19:32:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/KRACK-Attack/m-p/7602#M930</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-16T19:32:28Z</dc:date>
    </item>
  </channel>
</rss>

