{"id":94652,"date":"2017-10-20T12:34:05","date_gmt":"2017-10-20T12:34:05","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=94652"},"modified":"2025-07-01T23:45:10","modified_gmt":"2025-07-02T06:45:10","slug":"how-to-find-out-if-your-device-is-vulnerable-to-krack-attack","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/how-to-find-out-if-your-device-is-vulnerable-to-krack-attack\/","title":{"rendered":"How to Find Out if Your Device is Vulnerable to KRACK Attack"},"content":{"rendered":"<p>Since the KRACK vulnerability that endangers WPA2 WiFi security protocols was discovered a few\u00a0weeks ago, alarm bells have been blaring as <strong>the vulnerability gives cyberattackers the chance to access all of the information that your device communicates with your Wi-Fi<\/strong> (credit card numbers, password, emails, and so on) and, in certain cases, even <strong>insert false information or viruses<\/strong>. There are ways to avoid the dangers of KRACK; if you want to bring yourself up to speed, check out our article on <a href=\"https:\/\/en.softonic.com\/articles\/8-ways-to-protect-yourself-against-krack-the-ultimate-cyber-vulnerability\">8 Ways to Safeguard Yourself Against KRACK<\/a>.<\/p>\n<p>The latest development is that the researchers who first discovered KRACK have <strong>created a script that enables you to find out if your Wi-Fi is hackable or not.<\/strong> The script simulates the re-installation of the key that enables KRACK (KRACK stands for<strong> Key Reinstallation Attacks<\/strong>). If the access point does not process the request, it means your Wi-Fi is secure. If it accepts the request, that means your Wi-Fi is vulnerable to attack.<\/p>\n<p>The bad news is that <strong>the script is little complicated to run.<\/strong>\u00a0For starters, you\u2019ll need to know your access credentials. Even more complex, you&#8217;ll need to run the script from Kali Linux, a Debian GNU\/Linux based OS that is designed primarily for auditing PC security.<\/p>\n<p>If you want to give running the script a try, you can find it\u00a0<a href=\"https:\/\/github.com\/vanhoefm\/krackattacks-test-ap-ft\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. May the force be with you.<\/p>\n<p>Fortunately, the internet has plenty of cyber-Samaritans, so <strong>there is a good chance that somebody will decide to create a more user-friendly version of the script<\/strong>. When they do, we&#8217;ll let you know.<\/p>\n<p>Although some of the big companies, like Microsoft, have begun <a href=\"https:\/\/en.softonic.com\/articles\/all-your-wi-fi-connected-devices-could-be-vulnerable-to-cyber-attack\" target=\"_blank\" rel=\"noopener noreferrer\">releasing patches for their devices<\/a>, the researchers who discovered KRACK are concerned that the vulnerability is just the tip of the iceberg, and that it will eventually lead to further breakdowns of security in WPA2-enabled devices. <strong>They believe that the only solution is to create a new and upgraded security protocol: WPA3.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Via: ADSLZone<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the KRACK vulnerability that endangers WPA2 WiFi security protocols was discovered a few\u00a0weeks ago, alarm bells have been blaring as the vulnerability gives cyberattackers the chance to access all of the information that your device communicates with your Wi-Fi (credit card numbers, password, emails, and so on) and, in certain cases, even insert false &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/how-to-find-out-if-your-device-is-vulnerable-to-krack-attack\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;How to Find Out if Your Device is Vulnerable to KRACK Attack&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9073,"featured_media":94653,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[2441],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-94652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/94652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9073"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=94652"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/94652\/revisions"}],"predecessor-version":[{"id":328495,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/94652\/revisions\/328495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/94653"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=94652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=94652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=94652"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=94652"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=94652"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=94652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}