From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 25,200 courses taught by industry experts.

Understanding Dragonblood

Understanding Dragonblood

- [Instructor] Unfortunately for WPA3, the researchers who created the crack attack on WPA2 have been able to demonstrate that WPA3 is vulnerable to a number of attacks with a research and testing program known as Dragonsblood. Their research initially identified timing leaks and authentication bypasses in the WPA3 daemon, and subsequently discovered downgrade and denial of service attacks. A number of side channel attacks were discovered, including one which worked even after the equipment was patched. Interestingly, their research suggests that for the expenditure of a dollar on an Amazon EC2 instance, there would be enough computing power to brute force crack the password. Also interestingly, the design of WPA3 did not address a known history of side channel leaks, despite these being raised as concerns. The researchers conclude that a minor change to Dragonfly's password and coding algorithm, removing the peer MAC…

Contents