Questions tagged [wpa2-psk]

80 questions
1
vote
1 answer

Why does message 1 of the WPA2 4 way handshake begin with the access point sending a random number?

All the references I have found https://en.wikipedia.org/wiki/IEEE_802.11i-2004 https://www.wifi-professionals.com/2019/01/4-way-handshake https://www.hitchhikersguidetolearning.com/2017/09/17/eapol-4-way-handshake/ indicate that the first thing…
aquagremlin
  • 133
  • 5
1
vote
1 answer

How is the MIC (message integrity code) generated in WPA2?

We know that in WPA2's four-way handshake, a MIC is generated in order verify the supplicant (client). But how it is generated? Is something hashed to get the MIC? The PTK (pairwise transient key) depends on the nonces and MAC addresses and also the…
Mr_VK
  • 13
  • 3
1
vote
1 answer

With WiFi now having protected management frames, is it still worth attempting an evil twin attack?

I was trying to aireplay'ng my home WiFi but I understood that with the new generation of APs, there is a system of protected management frames. So I'm asking, is it still worth it to perform an evil twin attack? I think not, because without…
Joe
  • 31
  • 2
1
vote
2 answers

Key reinstallation attack how does it work without a pre-shared key?

The author of the key reinstallation attack released scripts on Github to test AP and clients. To test the clients, you have to connect to a fake AP but you still need to know the pre-shared key. Of course you know the password, because you created…
Elegancia
  • 11
  • 2
1
vote
1 answer

Where does last 4 bytes of hmac go in wpa2 mic?

The wpa2 mic is a 16 bytes array which is built by Hmac(sha1) ,But the Hmac(sha1) returns 20 bytes array. So where does that 4 bytes go?
msx
  • 11
  • 2
1
vote
2 answers

Details of a good WPA2 pre-shared key (password)?

From the following answer, I understand a strong pre-shared key must be 15 characters at minimum and randomly generated: https://security.stackexchange.com/a/56646/37051 However, from other reading, I understand that cryptographically strong…
MountainX
  • 340
  • 4
  • 13
1
vote
1 answer

Save decrypted pcap or decrypt on reading with rdpcap

I created a small program with runs command: tshark -i2 -o wlan.enable_decryption:TRUE -o "uat:80211_keys:\"wpa-pwd\",\" Passphrase:SSID\"" -w test.pcapng This creates the file test.pcapng, but it is not decrypted. I know from Wireshark docs that…
1
vote
2 answers

Is HTTP secure within a WPA2-PSK connection?

I'm running a small, low power web server chip which creates a Wi-Fi access point using WPA2-PSK AES encryption. This chip is never connected to the public Internet or any other network. A client device may connect to this access point and receive…
user169301
  • 13
  • 3
1
vote
2 answers

KRACK Attack vs sniffing

Trying to learn.... The ultimate difference between the vulnerability outlined in the answer posted here and KRACK attack is that with KRACK attack, the attacker does not need the AP pass phrase?
mobill
  • 441
  • 3
  • 7
1
vote
1 answer

wpa2-psk aes hacking with android

I have a digisol HR3400 router, I want to prevent it from being hacked. Can I use wpa2-psk aes to prevent hacking by Android apps like andro dumper or wpa tester?
Dr geek
  • 13
  • 3
1
vote
3 answers

Why can't Wifi be secured assymetrically?

Why couldn't we switch from AES to something asymmetric? Then a private key doesn't need to be shared with the client; rather just share a public key with them.
nassan
  • 121
  • 1
1
vote
1 answer

Is WPA-PSK of IEEE 802.11 insecure if PSK is exposed?

In WPA 4-Way Handshake, SNonce, ANonce, AP MAC addr and STA MAC addr are exposed to an eavesdropper Eve. But I think it is still safe unless PSK (password) is exposed to Eve. If PSK is exposed, however, I think connection is not secure any more…
Jeon
  • 141
  • 4
1
vote
1 answer

See communication in WiFi with known password

I know the password to a certain router which uses WPA2-PSK-CCMP + WPS + ESS, is it possible to watch the communication between devices and the router unencrypted assuming I know the password to the router? I tried to sniff traffic in monitor mode…
Zach P
  • 131
  • 4
1
vote
2 answers

Is WPA-PSK AES safer than WPA-PSK TKIP-AES?

On this forum thread I see (translated): On Telecom Router we have those wifi encryption modes Disabled-OpenNet - WEP (128 bit) -> WEP (unsafe breakable in some minutes) - WPA-PSK TKIP 256 bit -> WPA (unsafe breakable in some hours) - WPA-PSK…
elbarna
  • 113
  • 1
  • 4
1
vote
1 answer

How safe is it to use a Linksys WAP54G Access Point?

I have a Linksys WAP54G v1 device that I want to use to create a second WiFi network. The device is configured for WPA2-Personal, AES encryption with a random 64 character paraphrase. The firmware is version 3.04 (circa 2009). What is the risk in…
Rick
  • 113
  • 4