Wi-Fi Snippets
- Authentication Cracking: 4-Way Handshake Crack
- Authentication Cracking: EAP Relay Attack
- Authentication Cracking: Overview
- Authentication Cracking: PMKID
- Authentication Cracking: WPS
- Client Attacks: Captive Portal
- Client Attacks: DNS & ARP Poisoning
- Client Attacks: JS Injection
- Client Attacks: NetNTLM Hash Stealing
- EAP-PEAP Handshake
- Wi-Fi Handshaking (Enterprise Networks)
- Hacker Devices: Wi-Fi Pineapple
- Hacker Devices: Wi-Fi Coconut
- Hacker Devices: Wi-Fi USB Rubber Ducky
- Hacker Devices: O.MG Charging Cable
- Wi-Fi Handshaking (PSK Personal Networks)
- Known Beacons
- Rogue AP/Evil Twin Overview
- KARMA/MANA
- Captive Portal
- Wi-Fi Monitoring Overview
- WiGLE Database
- Defining the Wireless Security Problem
- Wi-Fi Handshaking
- Denial of Service (DoS)
Excerpt From wi-fi vulnerabilities part 2 Webinar
CTO Dr. Brett Walkenhorst Discusses Wi-Fi Handshaking (PSK Personal Networks).
Attackers frequently aim to evade or compromise the first handshaking protocol in Wi-Fi networks. True authorization takes place during the 4-way handshake, even though it is commonly perceived as an authentication technique. CTO Dr. Brett Walkenhorst gives a summary of this procedure in relation to personal Wi-Fi networks using pre-shared keys in the video clip below.
Wi-Fi Handshaking (PSK Personal Networks) — Bastille