Description: Welcome to Part 35 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will look at how EAP-TTLS based authentication is just as susceptible to Certificate spoofing attacks like PEAP. We will use different inner authentication protocols with EAP-TTLS - MSCHAPv2, MSCHAP, CHAP, PAP etc. and show how a hacker could create a honeypot and crack the client password.
Interestingly, for one of the protocols mentioned above FreeRadius-WPE seems to crash :) Can anyone confirm if this happens to them as well? Could we have an 0Day here :) ?