Wi-Fi Snippets
- Authentication Cracking: 4-Way Handshake Crack
- Authentication Cracking: EAP Relay Attack
- Authentication Cracking: Overview
- Authentication Cracking: PMKID
- Authentication Cracking: WPS
- Client Attacks: Captive Portal
- Client Attacks: DNS & ARP Poisoning
- Client Attacks: JS Injection
- Client Attacks: NetNTLM Hash Stealing
- EAP-PEAP Handshake
- Wi-Fi Handshaking (Enterprise Networks)
- Hacker Devices: Wi-Fi Pineapple
- Hacker Devices: Wi-Fi Coconut
- Hacker Devices: Wi-Fi USB Rubber Ducky
- Hacker Devices: O.MG Charging Cable
- Wi-Fi Handshaking (PSK Personal Networks)
- Known Beacons
- Rogue AP/Evil Twin Overview
- KARMA/MANA
- Captive Portal
- Wi-Fi Monitoring Overview
- WiGLE Database
- Defining the Wireless Security Problem
- Wi-Fi Handshaking
- Denial of Service (DoS)
Excerpt From Wi-fi vulnerabilities part 2 Webinar
Watch the Video Below to Learn More About Wi-Fi Handshaking (Enterprise Networks).
An access point, a client, and a RADIUS server are involved in authentication in an enterprise network. As the gatekeeper, the RADIUS server communicates with the access point to enable authentication. An identification exchange and a start message precede the process’s start. Through a challenge-response process, where the server issues a challenge unique to the user’s identification, the client must demonstrate its legitimacy. Learn more with CTO Dr. Brett Walkenhorst in this short video below.
Wi-Fi Handshaking (Enterprise Networks) — Bastille