Closed
Description
Hi @vanhoefm
I have some doubts about these attacks.
The precondition of these attacks is that the attacker has already known PTK and GTK to attack other device, right? If yes, I don’t think this is a vulnerable loophole. The key point is that the attacker should have no way to know the PTK.
If the attacker has already known the PTK GTK, then he can do anything.
Maybe he should explain how he gets the PTK first.
Metadata
Metadata
Assignees
Labels
No labels