Questions tagged [wpa2-psk]
80 questions
1
vote
1 answer
Why does message 1 of the WPA2 4 way handshake begin with the access point sending a random number?
All the references I have found
https://en.wikipedia.org/wiki/IEEE_802.11i-2004
https://www.wifi-professionals.com/2019/01/4-way-handshake
https://www.hitchhikersguidetolearning.com/2017/09/17/eapol-4-way-handshake/
indicate that the first thing…
![](../../users/profiles/248034.webp)
aquagremlin
- 133
- 5
1
vote
1 answer
How is the MIC (message integrity code) generated in WPA2?
We know that in WPA2's four-way handshake, a MIC is generated in order verify the supplicant (client). But how it is generated? Is something hashed to get the MIC? The PTK (pairwise transient key) depends on the nonces and MAC addresses and also the…
![](../../users/profiles/250411.webp)
Mr_VK
- 13
- 3
1
vote
1 answer
With WiFi now having protected management frames, is it still worth attempting an evil twin attack?
I was trying to aireplay'ng my home WiFi but I understood that with the new generation of APs, there is a system of protected management frames. So I'm asking, is it still worth it to perform an evil twin attack? I think not, because without…
![](../../users/profiles/229399.webp)
Joe
- 31
- 2
1
vote
2 answers
Key reinstallation attack how does it work without a pre-shared key?
The author of the key reinstallation attack released scripts on Github to test AP and clients.
To test the clients, you have to connect to a fake AP but you still need to know the pre-shared key. Of course you know the password, because you created…
![](../../users/profiles/201439.webp)
Elegancia
- 11
- 2
1
vote
1 answer
Where does last 4 bytes of hmac go in wpa2 mic?
The wpa2 mic is a 16 bytes array which is built by Hmac(sha1)
,But the Hmac(sha1) returns 20 bytes array.
So where does that 4 bytes go?
![](../../users/profiles/200581.webp)
msx
- 11
- 2
1
vote
2 answers
Details of a good WPA2 pre-shared key (password)?
From the following answer, I understand a strong pre-shared key must be 15 characters at minimum and randomly generated:
https://security.stackexchange.com/a/56646/37051
However, from other reading, I understand that cryptographically strong…
![](../../users/profiles/37051.webp)
MountainX
- 340
- 4
- 13
1
vote
1 answer
Save decrypted pcap or decrypt on reading with rdpcap
I created a small program with runs command:
tshark -i2 -o wlan.enable_decryption:TRUE -o "uat:80211_keys:\"wpa-pwd\",\" Passphrase:SSID\"" -w test.pcapng
This creates the file test.pcapng, but it is not decrypted. I know from Wireshark docs that…
![](../../users/profiles/185298.webp)
Adrian Rudy Dacka
- 43
- 7
1
vote
2 answers
Is HTTP secure within a WPA2-PSK connection?
I'm running a small, low power web server chip which creates a Wi-Fi access point using WPA2-PSK AES encryption. This chip is never connected to the public Internet or any other network. A client device may connect to this access point and receive…
![](../../users/profiles/169301.webp)
user169301
- 13
- 3
1
vote
2 answers
KRACK Attack vs sniffing
Trying to learn....
The ultimate difference between the vulnerability outlined in the answer posted here and KRACK attack is that with KRACK attack, the attacker does not need the AP pass phrase?
![](../../users/profiles/77904.webp)
mobill
- 441
- 3
- 7
1
vote
1 answer
wpa2-psk aes hacking with android
I have a digisol HR3400 router, I want to prevent it from being hacked.
Can I use wpa2-psk aes to prevent hacking by Android apps like andro dumper or wpa tester?
![](../../users/profiles/158200.webp)
Dr geek
- 13
- 3
1
vote
3 answers
Why can't Wifi be secured assymetrically?
Why couldn't we switch from AES to something asymmetric? Then a private key doesn't need to be shared with the client; rather just share a public key with them.
![](../../users/profiles/153438.webp)
nassan
- 121
- 1
1
vote
1 answer
Is WPA-PSK of IEEE 802.11 insecure if PSK is exposed?
In WPA 4-Way Handshake, SNonce, ANonce, AP MAC addr and STA MAC addr are exposed to an eavesdropper Eve. But I think it is still safe unless PSK (password) is exposed to Eve.
If PSK is exposed, however, I think connection is not secure any more…
![](../../users/profiles/67426.webp)
Jeon
- 141
- 4
1
vote
1 answer
See communication in WiFi with known password
I know the password to a certain router which uses WPA2-PSK-CCMP + WPS + ESS, is it possible to watch the communication between devices and the router unencrypted assuming I know the password to the router?
I tried to sniff traffic in monitor mode…
![](../../users/profiles/125022.webp)
Zach P
- 131
- 4
1
vote
2 answers
Is WPA-PSK AES safer than WPA-PSK TKIP-AES?
On this forum thread I see (translated):
On Telecom Router we have those wifi encryption modes
Disabled-OpenNet
- WEP (128 bit) -> WEP (unsafe breakable in some minutes)
- WPA-PSK TKIP 256 bit -> WPA (unsafe breakable in some hours)
- WPA-PSK…
![](../../users/profiles/84046.webp)
elbarna
- 113
- 1
- 4
1
vote
1 answer
How safe is it to use a Linksys WAP54G Access Point?
I have a Linksys WAP54G v1 device that I want to use to create a second WiFi network.
The device is configured for WPA2-Personal, AES encryption with a random 64 character paraphrase. The firmware is version 3.04 (circa 2009).
What is the risk in…
![](../../users/profiles/89433.webp)
Rick
- 113
- 4