-
Notifications
You must be signed in to change notification settings - Fork 183
06. WPA WPA2 PSK Traffic Decryption
Koutto edited this page Nov 1, 2020
·
1 revision
- Every client (and AP) has the same PMK on a given network (computed from Passphrase PSK).
- However, the PTK key generated from PMK is unique and generated during the WPA authentication (different for each client).
- And PTK is used to encrypt data between client & AP.
Therefore, in order to decrypt data on WPA/WPA2 network, an attacker needs:
- Passphrase PSK => Will allow to generate PMK.
- 4-Way Handshake => Will allow (along with PMK) to generate PTK for the targeted used.
- 01. WiFi Basics
- 02. 802.11 Specifications
- 03. WPS (WiFi Protected Setup)
- 04. WPA Protocol Overview
- 05. WPA/WPA2 Personal (PSK) Authentication
- 06. WPA/WPA2 PSK Traffic Decryption
- 07. WPA/WPA2 Enterprise (MGT)
- 08. Evil Twin Attacks
- 09. 802.11 Network Selection Algorithms
- 01. WiFi Interfaces Management
- 02. WiFi Connection
- 03. WiFi Monitoring (Passive Scanning)
- 04. Hotspot Captive Portal Bypass
- 05. WiFi Denial of Service
- 06. WEP Authentication Cracking
- 07. WPA/WPA2 Personal (PSK) Authentication Cracking
- 08. WPA/WPA2 Enterprise (MGT) Authentication Cracking
- 09. WPA/WPA2 Personal (PSK) Traffic Decryption
- 10. Basic AP (Manual Configuration)
- 11. Open Network (no passphrase) Rogue AP / Evil Twin
- 12. WPA/WPA2 Personal (PSK) Rogue AP / Evil Twin
- 13. WPA/WPA2 Enterprise (MGT) Rogue AP / Evil Twin