Skip to content

Does the attacker need to know PTK and GTK to attack other device? #3

Closed
@zyz2015

Description

@zyz2015

Hi @vanhoefm

I have some doubts about these attacks.

The precondition of these attacks is that the attacker has already known PTK and GTK to attack other device, right? If yes, I don’t think this is a vulnerable loophole. The key point is that the attacker should have no way to know the PTK.

If the attacker has already known the PTK GTK, then he can do anything.

Maybe he should explain how he gets the PTK first.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions