{"id":8975,"date":"2021-06-05T13:41:53","date_gmt":"2021-06-05T05:41:53","guid":{"rendered":"https:\/\/ailog.tw\/lifelog\/?p=8975"},"modified":"2021-06-05T14:06:06","modified_gmt":"2021-06-05T06:06:06","slug":"wifi-fragattacks","status":"publish","type":"post","link":"https:\/\/ailog.tw\/lifelog\/2021\/06\/05\/wifi-fragattacks\/","title":{"rendered":"Wi-Fi 802.11\u9023\u7dda\u6a5f\u5236\u542b\u6709Frag Attacks\u6f0f\u6d1e\uff0c\u5f71\u97ff\u7bc4\u570d\u6db5\u84cb\u5404\u5927\u54c1\u724c"},"content":{"rendered":"<p><span style=\"font-size: 14pt; font-family: verdana, geneva;\">Mathy Vanhoef\u662f\u7d10\u7d04\u5927\u5b78\u963f\u5e03\u624e\u6bd4\u5206\u6821\u7684CSP(\u7db2\u7d61\u5b89\u5168\u8207\u96b1\u79c1)\u7814\u7a76\u54e1\uff0c\u57282021\u5e745\u670811\u65e5\u6642\u767c\u4f48\u4e86\u4e00\u7bc7\u8ad6\u6587Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation\uff0c\u5176\u4e2d\u63d0\u51fa\u768412\u500b\u6f0f\u6d1e(\u5df2\u6709\u7de8\u5217CVE\u7de8\u865f)\u6db5\u84cb\u4e86\u5e02\u9762\u4e0a\u6240\u6709\u7684\u7121\u7dda\u7db2\u8def\u8a2d\u5099\u54c1\u724c\uff0c<!--more-->\u7ba1\u7406\u8005\u76e1\u5feb\u806f\u7d61\u8a2d\u5099\u7dad\u8b77\u5ee0\u5546\u6216\u539f\u5ee0\uff0c\u76e1\u5feb\u66f4\u65b0\u8a2d\u5099\u97cc\u9ad4\u3002<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: verdana, geneva;\">\u6f0f\u6d1e\u539f\u56e0\uff1a<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">Wi-Fi 802.11\u9023\u7dda\u6a19\u6e96\u8a2d\u8a08\u6642\u7684\u7f3a\u9677\uff0c\u56e0\u6b64\u8a72\u6f0f\u6d1e\u6db5\u84cb\u4e86\u6240\u6709\u5e02\u9762\u4e0a\u7684\u7121\u7dda\u7db2\u8def\u8a2d\u5099\u3002<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: verdana, geneva;\">\u6f0f\u6d1eCVE\u7de8\u865f\uff1a<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-24588<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-24587<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-24586<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26145<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26144<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26140<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26143<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26139<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26146<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26147<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26142<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">CVE-2020-26141\u00a0<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: verdana, geneva;\">Mathy Vanhoef\u8ad6\u6587\uff1a<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">Fragment and Forge: Breaking Wi-Fi Through<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\">Frame Aggregation and Fragmentation<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: verdana, geneva;\"><a href=\"https:\/\/papers.mathyvanhoef.com\/usenix2021.pdf\">https:\/\/papers.mathyvanhoef.com\/usenix2021.pdf<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mathy Vanhoef\u662f\u7d10\u7d04\u5927\u5b78\u963f\u5e03\u624e\u6bd4\u5206\u6821\u7684CSP(\u7db2\u7d61\u5b89\u5168\u8207\u96b1\u79c1)\u7814\u7a76\u54e1\uff0c\u57282021\u5e745\u670811\u65e5\u6642\u767c\u4f48 &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ailog.tw\/lifelog\/2021\/06\/05\/wifi-fragattacks\/\" class=\"more-link\">\u95b1\u8b80\u5168\u6587<span class=\"screen-reader-text\">\u3008Wi-Fi 802.11\u9023\u7dda\u6a5f\u5236\u542b\u6709Frag Attacks\u6f0f\u6d1e\uff0c\u5f71\u97ff\u7bc4\u570d\u6db5\u84cb\u5404\u5927\u54c1\u724c\u3009<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,385],"tags":[4011,4010,4009,4016,4014,4020,4019,4015,4013,4012,4017,4018,4021,4022],"class_list":["post-8975","post","type-post","status-publish","format-standard","hentry","category-itinfo","category-security","tag-cve-2020-24586","tag-cve-2020-24587","tag-cve-2020-24588","tag-cve-2020-26139","tag-cve-2020-26140","tag-cve-2020-26141","tag-cve-2020-26142","tag-cve-2020-26143","tag-cve-2020-26144","tag-cve-2020-26145","tag-cve-2020-26146","tag-cve-2020-26147","tag-frag-attacks","tag-mathy-vanhoef"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/posts\/8975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/comments?post=8975"}],"version-history":[{"count":3,"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/posts\/8975\/revisions"}],"predecessor-version":[{"id":8978,"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/posts\/8975\/revisions\/8978"}],"wp:attachment":[{"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/media?parent=8975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/categories?post=8975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ailog.tw\/lifelog\/wp-json\/wp\/v2\/tags?post=8975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}