Description: Welcome to Part 35 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will look at how EAP-TTLS based authentication is just as susceptible to Certificate spoofing attacks like PEAP. We will use different inner authentication protocols with EAP-TTLS - MSCHAPv2, MSCHAP, CHAP, PAP etc. and show how a hacker could create a honeypot and crack the client password.
Interestingly, for one of the protocols mentioned above FreeRadius-WPE seems to crash :) Can anyone confirm if this happens to them as well? Could we have an 0Day here :) ?
Tags: wifi , megaprimer , video , wlan , eap-ttls , mschapv2 , mschap , pap , chap ,
wow, thanks for another awesome video.
As usual, Vivek, awesome! This is getting into some pretty complicated stuff.
BTW, what is the honeypot AP you are using in the previous videos?