In this chapter, we've gone over the new KRACK attack, covered how the WPA2 handshake works, and saw how to perform a PoC check against a device. The KRACK attack will develop as time goes on and more scripts are released into the wild. Readers should keep up with the community and monitor for new and interesting applications of this research.
Readers should also visit the researcher's web page at https://www.krackattacks.com/.
Also, read the white paper for a greater understanding found at https://papers.mathyvanhoef.com/ccs2017.pdf.