Description: Welcome to Part 34 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will explore the implementation of PEAP in Windows and touch upon the following concepts - ensuring that Certificate verification is turned on, proper radius servers are mentioned, certifying authorities for the RADIUS server's certificate are selected and finally in case there is a problem with the certificate, then the use is not prompted to accept / reject new certificates or certifying authorities.
We will once again use Asleap to crack the password using the Challenge-Response pair in MSCHAP format, sent within the TLS tunnel created during the use of PEAP.
Please do leave your comments behind!