Questions tagged [wpa2-psk]

80 questions
3
votes
1 answer

Does WPS actually send passphrase?

As you know, by hacking WPS we can get the networks PSK but my question is that does WPS exactly transfers PSK when connection established? If so, Why does it need to send PSK? I mean, if the session is started successfully, why AP should send PSK…
lusic
  • 31
  • 1
2
votes
2 answers

Enabled WPS methods

I would like to know if there are tools available to identify what WPS method is actually enabled on an AP? I would like to know also if there is a way by looking at packets to know which WPS method is enabled?
Othman
  • 587
  • 5
  • 16
2
votes
1 answer

Encrypting layers of OSI

I was reading that WPA2-PSK encrypts layer 2 of the OSI network model. What is the danger of having this layer in plaintext (I know it can be decrypted very easily from within the network)? Is there a point to encrypting it when all higher layer…
dylan7
  • 737
  • 8
  • 17
2
votes
2 answers

WPA with PSK and with Radius Server

In case of WPA2 using the Radius server, every client gets its own username and password. But what is the case in the WPA2 using a PSK without the authenticating server. In this case also we have a 4 way handshake. But is the PTK derived by all…
Ankur Bhatia
  • 125
  • 1
  • 5
2
votes
1 answer

How can I get EAPOL packet's number?

I need to work with EAPOL packets, and I have to distinguish between first, second, third and fourth... If I'm using WPA2 I can use the first 2 bytes of Key Information field, and I can use Key MIC, Secure, Encrypted Kedy Data... But if I'm using…
Teo
  • 191
  • 8
2
votes
2 answers

Can a rogue client bypass the Wi-Fi Access Point?

Let's assume that one client contains malware, and that it belongs to a Wi-Fi network protected with WPA2/Personal (hence, via a password known to the piece of malware), where some other vulnerable clients are present. I can activate some filtering…
2
votes
0 answers

WPA3-Personal and traffic privacy

It is well known that (malicious) endpoints in a Wi-Fi network password-protected by WPA2-Personal can sniff all clear traffic to/from any other endpoint, if they can also capture the 4-way handshake of each connecting device. That information…
2
votes
1 answer

Will WPA Enterprise give any advantage on home network with one user?

I understand some of the reasons why WPA Enterprise is more secure from this question: Why is WPA Enterprise more secure than WPA2? However, given a home network with only one single user where that user has a long and complex password (at least 28…
MountainX
  • 340
  • 4
  • 13
2
votes
2 answers

Wireless network solution? WPA2/MAC Filtering problems

In short we have 7 Mobile Casio Scanners that seem to be incapable of holding their Wi-Fi passwords, they sometimes lose them for no apparent reason. We of course, cannot give out the wireless password as this would be giving out access to our LAN…
2
votes
1 answer

WPA PSK to WPA EAP PSK roaming

Would clients (iPhone, android, whatever) roam seamlessly from an AP using WPA-PSK to an AP using WPA-EAP-PSK (with PEAP passthrough setup) if the same PSK was used and valid on both APs (AP1 and AP2 radius)? Further elaboration: 1) I would like to…
2
votes
1 answer

Why does john force MinLen to 8 for wpapsk?

I'm trying to use john to test wpa security. I want it to generate 10-character passwords, so I've added this to john.conf: [Incremental:Test] File = $JOHN/alnum.chr MinLen = 10 MaxLen = 10 CharCount = 62 However, when I run john --format=wpapsk…
2
votes
1 answer

Sniffing WPA2 PSK traffic with the key but without association

Assume a situation where a wireless access point is using WPA2-PSK, and it is configured to allow only a single client association at one time. Client A connects to the access point with PSK and engages in some higher layer communication with hosts…
senator
  • 23
  • 1
  • 3
2
votes
1 answer

What is the difference between key mechanism in wep and wpa

I haven't found the resources explaining about exact authentication mechanism about wpa-psk in the internet. finally i found securitytube videos i found one video regarding the wpa-psk concepts.in those videos it is said that wpa-psk uses dynamic…
ashok
  • 231
  • 1
  • 3
  • 5
1
vote
1 answer

Role of derived keys in EAP-PSK in WPA-2

I'm currently trying to understand WPA-2 and I've discovered that it's built on the EAP-PSK protocol which sets up some keys derived from the SSID name and a password. I assume that the keys derived from EAP-PSK, namely AK and TEK, are used in the…
Dragos
  • 113
  • 4
1
vote
1 answer

What does the SSID have to do with a networks security concerning rainbow tables?

I have noticed in a few places people mention that if a popular SSID is used, it makes a network more vulnerable to rainbow table attacks. I saw this in one location and assumed they'd mistakenly used SSID in place of the word password, but I just…
dahui
  • 497
  • 1
  • 4
  • 14