Description: Welcome to Part 21 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will look at WPA-PSK and begin understanding its inner workings. This a pretty advanced topic, so please pay attention :) The video is also quite long at 35 minutes.
We begin by understanding how the Pre-Shared Key is derived from the Passphrase using the Password based Key Derivation Function (PBKDF). Then we move on to the WPA 4 Way Handshake and analyze each packet in detail.
The 4 Way Handshake is used to create the Pairwise Transient Key (PTK) using the Pairwise Master Key (PMK) (which is actually the Pre-Shared Key in this case), the Authenticator Nonce, the Supplicant Nonce, AP MAC address and the Client MAC address. We will look at each packet in Wireshark and match it with the 802.11i standard specifications :)
I also misspelled Nonce as Nounce on all slides :) So a few giggles there as well to cool off this difficult topic.
Hope you enjoy this video!
Latest from the SecurityTube Blog: