Results 1 to 1 of 1
  1. #1
    Master Untangler
    Join Date
    Mar 2017
    Posts
    182

    Default FYI: New attack on WPA/WPA2 using PMKID

    Head on to https://hashcat.net/forum/thread-7717.html for the details.

    In summary, a new spin on the well known password guessing attack against WPA/WPA2 PSK. I'm not posting this to ask anything about updates, UT staff stance, ecc. since this is nothing different from the past from the defenders' point of view. It simply makes easier for the attacker, in some cases, to proceed to the password guessing vector since it doesn't need to sniff a WPA handshake anymore.

    So, even client-less networks can be attacked. Simply choose a strong PSK and be willing to periodically rotate it.
    Last edited by docfuz; 08-07-2018 at 02:36 AM.
    Sam Graf and sammy_cda like this.
    Happily untangling the average household: 20-25 active devices, 13 racks, each with 3 - 8 apps, OpenVPN 1 in, IPSec 1 road-warrior, TunnelVPN 3 out, IPS on. Spice it up with VLANs and mix with tons of rules.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

SEO by vBSEO 3.6.0 PL2