From the course: Ethical Hacking: Wireless Networks
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Understanding Dragonblood - Linux Tutorial
From the course: Ethical Hacking: Wireless Networks
Understanding Dragonblood
- [Instructor] Unfortunately for WPA3, the researchers who created the crack attack on WPA2 have been able to demonstrate that WPA3 is vulnerable to a number of attacks with a research and testing program known as Dragonsblood. Their research initially identified timing leaks and authentication bypasses in the WPA3 daemon, and subsequently discovered downgrade and denial of service attacks. A number of side channel attacks were discovered, including one which worked even after the equipment was patched. Interestingly, their research suggests that for the expenditure of a dollar on an Amazon EC2 instance, there would be enough computing power to brute force crack the password. Also interestingly, the design of WPA3 did not address a known history of side channel leaks, despite these being raised as concerns. The researchers conclude that a minor change to Dragonfly's password and coding algorithm, removing the peer MAC…
Contents
-
-
-
Understanding wireless networks5m 52s
-
(Locked)
Selecting an antenna for wireless network testing5m 16s
-
(Locked)
Configuring security in wireless networks3m 26s
-
(Locked)
Understanding the Wi-Fi Protected Setup (WPS)5m 20s
-
(Locked)
Extracting WEP passwords using Wifite2m 9s
-
(Locked)
Extracting network passwords through WPS2m 35s
-
(Locked)
Using WiFite and Aircrack-ng to test WPA passwords2m
-
(Locked)
Using Pixiedust to recover keys2m 44s
-
(Locked)
A first look at WPA32m 26s
-
(Locked)
Understanding Dragonblood2m 37s
-
-
-
-
-
-