Description: Welcome to Part 23 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will look at WPA2-PSK Cracking using dictionaries.
The basic point I want to make that the process is entirely same as the WPA-PSK case. We look at some differences in WPA-PSK and WPA2-PSK by looking at the MIC creation and Encryption algorithms in the Key Information field in the 4 way handshake.
Enjoy the video!
Tags: wpa-psk , wireless , wifi , security , megaprimer , pbkdf , ptk , pmk , anonce , snonce ,
Ola! Ola! First to comment again :)
Great video. I am learning so much and for FREE! amazing.
Great video Vivek :)
why you don´t come to germany? :D
Have fun in june :)
waiting for the next video...
Thanks for the informative video :)
Are you going to explain brute-force cracking of WPA(2) in any of your future videos?
Come to the UK on your way back from Belgium :)
Another great video Vivek? Just curious of when you will posting your solution to 3a and 3b WEP strikes back
--Chard
@Chard,Vivek: " Excellent video and very well done! I wish you could have cracked the 3b as well, but maybe next time.
The contest is officially over and I will post the solutions this week. "
He posted this comment on the second video.
Anyway thanks a lot Vivek, excellent as always.
Thank you Vivek For the excellent videos ............ I have learnt lot form your mega primers ...........................
&&&&&&
........securitytube gets constantly updated so i have set securitytube.net as my home page ................
@Vivek, they made a movie just for you, you're so popular nowadays.
The movie "Impatient Vivek" http://www.bollywoodhungama.com/movies/cast/14316/index.html , you see how impatient you are, you keep on making those awesome videos, one after the other without taking a break. :D :P
wow. vivek is just awesome. great work on this video. thanks man. im adding it to my dvd list. making a vivek megaprimer dvd so i can watch it while im working at my computer ;) love the vids. thanks alot
Thank you Vivek for working so hard to get these videos produced and uploaded. I hope that your time in Belgium will be profitable!
I've done some reading around what you've discussed and it seems that the only difference between this video and the last is that WPA uses TKIP(RC4) and WPA2 uses CCMP(AES). The technique of finding the passphrase is the same. I know that you've said elsewhere that you plan to cover how TKIP(RC4) and CCMP(AES) work and, presumably, the strength of the latter which indicates why everyone should use WPA2/CCMP. At the moment, I'm somewhat confused and don't *really* understand why WPA2 is preferred over WPA because retrieving the passphrase is equally easy (or difficult).
A number of things have leapt into my google searches and my eyes are bleeding because the original papers are complicated and I'm frustrated that I can't get my head around exactly how they work. I don't know how practical they are for use in a pen test or if you will touch upon them:
Beck-Tews attack (and Halvorsen's extension of this)
Ohigashi-Morii attack
the tkiptun-ng tool
Please don't think that I'm impatient because I'm not and it may well be that you plan to squeeze all of these topics into this series. You asked for comments and queries and I thought it would be better to post them here, rather than via e-mail, because there are other contributors who clearly know about these things and may be able to post valuable comments to supplement your thread comments and great videos.
Excellent as always Vivek. eagerly awaiting your explanation of the solution of challenge 3a & 3b
Hi Vivek,
Thanks very much for the videos. I saw few WPA cracking videos and successfully done that on my AP but you made it much clear how it is done and what actually involved in four way handshake. Please post videos on how to speed up brute force attack.
@John-Nash, roots, Wavelength Thanks a ton guys! :)
@3IL060 I would love to :) Let me know if there is any conference happening there in security and I will apply
@Chard I have plans for a UK travel shortly and will keep you updated! Will be fun to meet in-person :) I will be posting the solutions soon, I have a travel next week so bit caught up with it
@m0ei Thanks Buddy! Yes, solutions later this week for sure. Looks like a funny movie :) Will watch it sometime. Looking at the girl in the poster, I am wondering what the "impatience" was about ;)
@allisonmagivelite Most welcome! and if you can also post and seed a torrent. I would have loved to do that but in India BW charges are damn high!
@Ignatius Welcome my friend! Your research is in the right direction! WPA2 provides greater security primarily through CCMP and SHA1 (MIC) in comparison to WPA which uses TKIP (based entirely on WEP). This was the reason that many have found attacks on TKIP and even the MIC. From a PSK perspective both are crackable if a weak passphrase is chosen. I specifically did this video, as most places people seem to post WPA2 as invincible, not true at all, especially for the WPA2 Personal PSK edition.
@mgsyd, Oddi your wish is my command! Next video posted:
Part 24: Speeding Up Wpa/Wpa2 Psk Cracking
http://www.securitytube.net/video/1914
Thanks once more Vivek. A lesser man would have just said 'use the same method as WPA' but you take the time to explain the subtle difference and show the packets. That is why you are a master of the subject, and an excellent teacher. Thank you.
Enjoy Belgium. The place is the butt of many jokes in Europe - particularly in France :-)
@Vivek: If get wind of there will be a good security converence in germany I will tell you :)
@Vivek @3IL060: There is the 28C3 from the Chaos Computer Club in Berlin later this Year. - "Chaos Communication Congress 28c3. Berlin · December 27-30, 2011
Website from the last Year (27c3): http://events.ccc.de/congress/2010/wiki/Welcome
Can't find resources on the new one yet. ;)
Excellent video!, i noticed that cowpatty doesn't work with a incomplete handshake capture unlike aircrack ...
In the last video you mentioned that there was many ways to deauth. Could you show us more ways? Love all these videos by the way. Thank you so much for making these!
In the last video you mentioned that there was many ways to deauth. Could you show us more ways? Love all these videos by the way. Thank you so much for making these!
How to found a passphrase with specials characters as =#'(-_-)#@$£€. Thanks in advance and Thanks for your all tutos.
how do we crack the routers admin password??