This report provides an in-depth analysis of the Key Reinstallation Attack (KRACK), a critical vulnerability affecting WPA2-protected Wi-Fi networks. It details how the attack exploits a flaw in the 4-way handshake, allowing attackers to reinstall cryptographic keys, decrypt data, and inject malicious content. The technical description covers the attack vector, explaining how manipulation of the handshake protocol enables the replay and forging of packets. The report also outlines several mitigation strategies, including switching to AES CCMP encryption, using HTTPS, firewalls, VPNs, and antivirus software. Further remediation steps include enabling automatic updates, using wired connections, and transitioning to WPA3. The report concludes with an exploitation scenario and relevant references, offering a comprehensive understanding of the KRACK attack and its implications for cybersecurity.