Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <950fcf76-d7f1-5a6e-d679-a87e7ba194aa@htt-consult.com>
Date: Sun, 22 Sep 2019 09:50:47 -0400
From: Robert Moskowitz <rgm@...-consult.com>
To: john-users@...ts.openwall.com, "M.Hamza Aziz" <mhamzaaziz1@...il.com>
Subject: Re: How to crack WPA2



On 9/22/19 2:47 AM, M.Hamza Aziz wrote:
> I'm a new bae. I want to crack WPA2 SECURITY. how is this possible.
>
First you need to intercept something to attack, and that is easy. See 
my 2003 paper on it.  It is archived in many places like:

https://wifinetnews.com/archives/2003/11/weakness_in_passphrase_choice_in_wpa_interface.html

WPA or WPA2 it makes no difference, sadly.    There are papers and tools 
to do the rainbow attacks.

Just dig a bit and you will find lots of ways to get the WPA2 password.

Now with WPA3, they went with a PAKE (Password Augmented Key Exchange) 
which adds the password into a Elliptic Curve Diffie-Hellman exchange.  
On the IETF CFRG list there is lots of debates about the security 
profile for WPA3, but it is quite good. PAKEs in general are zero-proof 
key exchanges that should not have any offline attack.

But with WPA2; lots of attacks.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.