Questions tagged [wpa-enterprise]
26 questions
26
votes
1 answer
What is stronger - WPA2 Enterprise with 2048 bit key, or Personal with 63 character passphrase?
Which of the two following has a stronger cryptographic strength in withstanding brute-force attacks?
WPA/WPA2 Enterprise using 2048-bit RSA public-key
WPA/WPA2 Personal using 63-character Passphrase

ARRE
- 261
- 3
- 3
23
votes
2 answers
How is attacking WPA different from attacking WPA2?
What’s the difference between the process of attacking WPA and the process of attacking WPA2?
I know that WPA2 is much more secure than WPA. However, it seems the case that both of them are attacked using the same mechanism — basically, capturing…

Minaj
- 1,536
- 2
- 14
- 23
8
votes
1 answer
How to provide user friendly WiFi access to gym members with WPA2 Enterprise?
Background
A friend of mine is the owner of a medium sized gym. He wants to provide WiFi to his customers and asked me to come up with a concept and eventually also deploy it. As a computer scientist I have a thorough understanding of information…

Alexander Theißen
- 181
- 3
5
votes
2 answers
Is it possible for an 802.1x network (PEAP/MSCHAPv2) to have no certificate?
Is it possible for an 802.1x network (PEAP/MSCHAPv2) to have no certificate (CA, user, or otherwise)?
If so, what are the security implications?
The reason I ask is: I'm regularly connecting to a particular organization's WLAN and I'm under the…

voices
- 1,649
- 7
- 22
- 36
3
votes
2 answers
Are there any exploitable protocol flaws in WPA Enterprise?
I just watched this video https://www.offensive-security.com/penetration-testing/hacking-wpa-enterprise-with-kali-linux/ and the authors readily admit that the title is click-bait but I am still wondering what is going on.
Shouldn't there be a…

Corporal Touchy
- 527
- 1
- 4
- 10
3
votes
1 answer
RADIUS for WPA2 Enterprise in Cloud?
This is about securing WiFi APs which are usually connected to broadband like DSL and Fibre. Some of them are at business site and some are at home.
To protect against Evil Twin attack (basically spoofing AP, stealing password and then breaking into…

Aria
- 2,706
- 11
- 19
2
votes
2 answers
How can I secure Wifi against these specific attacks?
I have found myself in a situation where I need to setup a somewhat secure Wifi network. I am primarily concerned about these attacks, however I welcome any advice about other attacks that I should be concerned with as well:
An unauthorized party…

john01dav
- 215
- 1
- 6
2
votes
1 answer
Will WPA Enterprise give any advantage on home network with one user?
I understand some of the reasons why WPA Enterprise is more secure from this question: Why is WPA Enterprise more secure than WPA2?
However, given a home network with only one single user where that user has a long and complex password (at least 28…

MountainX
- 340
- 4
- 13
2
votes
2 answers
Is is possible to decrypt 802.11 for WPA enterprise?
So it is fairly trivial to decrypt 802.11 for WPA-PSK as explained in this link https://wiki.wireshark.org/HowToDecrypt802.11. Is it then possible to decrypt the same way for WPA enterprise?(Assuming that you do know the full credentials of the…

Lew Wei Hao
- 429
- 5
- 13
2
votes
1 answer
Does WPA PSK/Personal break PMK?
I am not sure about the difference between WPA-PSK TKIP and WPA-Enterprise TKIP key generation.
Do they both generate same keys from PMK, but for different purposes or are they created through a totally different process?

Heyro
- 31
- 2
2
votes
2 answers
What auth info is locally revealed with eduroam WPA-Enterprise 802.1X?
If you authenticated with your eduroam credentials at a participating institution, your home institution is the one doing the authentication of the credentials, and the host institution is only providing the internet access.
What 802.1X…

cnst
- 1,884
- 2
- 19
- 30
1
vote
1 answer
Under what circumstances can WPA be cracked?
can someone please tell me under what circumstances can WPA be cracked? i'll appreciate it.

Yilin LIU
- 41
- 1
1
vote
1 answer
How to protect against MAC spoofing in WiFi network?
I have this scenario:
I want to create a WiFi network for a hotel that the customers should pay to gain access to the internet.
I tried Captive portal, but captive portal is very vulnerable against MAC spoofing.
So I tried wpa2-enterprise without…

Amir Sabeghi
- 11
- 1
1
vote
1 answer
How does the EAP-TLS handshake work, exactly?
I'm trying to understand EAP-TLS authentication, but I'm struggling to understand a few bits:
Before the supplicant sends any certificates to the server, it usually verifies the server's identity.
After it does, how can it ensure that it's talking…

soundlarp
- 11
- 2
1
vote
1 answer
How do enterprises deal with SSO and Google backing up WiFi credentials?
Single Sign On in a company means that you have one set of credentials for all the services the company uses / provides to their employees.
Logically, these credentials might also be usable for Wifi.
Benefits for the employee: Only one password to…

PhilLab
- 205
- 1
- 6