Questions tagged [wpa2]

Security protocol (IEEE 802.11i) developed by the Wi-Fi Alliance to protect wireless networks.

WPA2 is the successor to the WPA protocol and was released in 2004, it is now mandatory for all new devices that bear the Wi-Fi trademark.

Improvements include:

  • AES-based encryption mode
  • CCMP
328 questions
24
votes
1 answer

How exactly does 4-way handshake cracking work?

From my understanding this is how WPA2 works for home networks: PSK (Pre-Shared Key) is used to generate PMK (Pairwise Master Key), which is used together with ANonce (AP Nonce) to create PTK (Pairwise Transient Key). PTK is devided into KCK (Key…
user3362334
  • 467
  • 1
  • 4
  • 10
9
votes
1 answer

Practical attacks against WPA2

Maybe a duplicate: Bruteforce on 10 characters length WPA2 password So I am trying to get into home network security for the fun of it. More concretely, I am trying to reproduce the scenario of cracking my home router's WPA2 pass-phrase. It was…
Vorac
  • 1,917
  • 3
  • 20
  • 29
7
votes
3 answers

Is it possible for someone to figure out my WIFI password by following me?

Say someone drives up and parks in front of my house. They get a list of all SSIDs they can pick up. My phone is configured to save the WPA2 password and automatically login when the SSID is in range. Is it possible for someone to follow me when I…
user1748155
  • 173
  • 1
  • 4
4
votes
1 answer

Few questions about Group Temporal Key (GTK) in WPA/WPA2

I have a few question about group key in WPA family: 1. How many bits GTK have? How much characters this key have? 2. From which characters GTK can be generated? From 0-9, a-z etc.? 3. Is GTK the final key to encrypt packets (GTK encrypts packets…
Bartosz Królak
  • 125
  • 1
  • 7
3
votes
2 answers

Is exposing the psk in /etc/network/interfaces a security risk?

I have an application that generates the /etc/network/interfaces file for connecting to the users wifi network. This application uses wpa_passphrase to generate the psk, which is then copied into the interfaces file. is exposing the psk in…
monzie
  • 133
  • 2
3
votes
2 answers

EAPOL messages in different WPA handshakes

I have a pcap file with two captured packets only. Time Protocol Info 0.000000 EAPOL Key (Message 3 of 4) 2934.200222 EAPOL Key (Message 2 of 4) I already know, messages 2 and 3 are sufficient to launch a…
user182672
  • 31
  • 3
2
votes
1 answer

Details of WPA2

Finding explanations about the various aspects of WPA2 suffers from inconsistent terminology and a general lack of clarity on what purpose some protocol/standard serves and how it relates to others. I'm not looking for a total breakdown of every…
Melab
  • 247
  • 1
  • 8
1
vote
1 answer

Why can't I have WPA handshake on aircrack?

I know this might seems general question to be googled first and I have tried. I have successfully de-authenticated the client or clients multiple times but I didn't get the message of WPA handshake but in it's place (top right corner) is written:…
Rust
  • 11
  • 1
1
vote
1 answer

Is WPA2 TKIP+AES with WPS disabled and strong keys secure? What about WPA2 Enterprise against a RADIUS server?

With all the recent vulnerabilities in WPA2 and so many low quality posts/articles in the internet about WPA2 security I am not being able to fully understand the risks of WPA2. Is WPA2 Personal secure provided that strong passwords (63 bytes…
M.E.
  • 111
  • 2
0
votes
1 answer

Fritz!Box default WPA2 security

I was wondering, how safe the default configuration of a Fritz!Box really is. By default, there is a 16 digit WPA2 key, which contains only numbers. My first though was, that bruteforcing is right easy, because it only containes numbers. I could…
davidbaumann
  • 213
  • 2
  • 11
0
votes
1 answer

Cowpatty handshakes vs Pyrit

At the moment I have a strange problem: I captured a pcap-file, and pyrit and aircrack tell me that it contains a valid handshake. But cowpatty complains about not having a full handshake, thus making it unable to crack the pcap file. Why? Is there…
arc_lupus
  • 209
  • 1
  • 10
0
votes
3 answers

The best papers on WPA/WPA2

I have to write a term project about WPA/WPA2: I should find and read five articles and write a sort of summary of the technology citing those articles. And no, the professor will not help find articles. It is a long shot, but if there is a reader…
Lucy Brennan
  • 211
  • 1
  • 2
  • 5
0
votes
1 answer

Why isn't WPA2 more secure?

Follow-up from this question. I just learned that all one needs to decrypt WPA2 traffic is the network key. So for example if I go to a coffee shop and they have the key on the wall I can listen to everything, and if people are visiting sites over…
-2
votes
2 answers

How secure are WPA2 keys?

Possible Duplicate: Are WPA2 connections with a shared key secure? I have a WPA2-Persinal security type and encryption AES, If I use wireshark can I see what apckets other computers send to the router in my network? assume I have the Network…
0x90
  • 1,422
  • 2
  • 20
  • 27