![KRACKing the WPA2](http://images.ctfassets.net/6afke33grie2/6NcJfH8gJW7nWcwtDXkFWH/0f6d3285d46269e424fd7b7b5201e83f/AdobeStock_130937327-1-1024x512.jpeg?w=400&q=90)
KRACKing the WPA2
The attack called KRACK (Key Reinstallation Attack) uses a Man in the Middle (MitM) attack methodology. It happens during the 4-way handshake phase and revolves around client using an all-zero key to encrypt communication with an Access Point (AP).