Link to this headingWPA2 Personal
- Also known as WPA2-PSK (Pre shared key)
- Uses [AES](/Crypto/Symmetric Encryption/AES) with Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)
- AKA [CCM](/Crypto/Symmetric Encryption/Block Ciphers/CCM) mode (Counter with CBC-MAC)
Link to this headingSecurity
- Must bruteforce the 4way handshake due to nonces
- Uses SSID as a salt
Deauthentication Attack
Link to this headingNonce Reuse
By retransmitting Message 3 of the 4 way handshake the IV is reset to a known (null) or reused IV.
IV reuse can be used by taking a IV from one channel and respond on a different channel.
IV reuse can be done with Reinstallation attack where Message 4 of the 4 way handshake is encrypted. Since this is prohibited by the spec the next data frame that is sent will reuse the IV.
Key Re-installation Attacks - Breaking WPA2 by forcing nonce reuse
Key Re-installation Attacks - PoC
Falling through the KRACKs
- Can replay packets because the counter is reset to 0
- Wpa supplicant refers to zeroed data for key reinstalation attacks. This makes the key all zeros
Link to this headingCapturing
Link to this headingPMKID with wifite
Link to this headingPMKID
PMKID is an ID that is sent out every couple of minuets which is a SHA1-HMAC of PMKID = HMAC-SHA1-128(PMK, "PMK Name" | MAC_AP | MAC_STA). The only Unknown is the PMK which can be calculated with a PBKDF PMK = PBKDF2(Passphrase, SSID, 4096)
Capture and Break hash:
Link to this headingCapturing the 4way handshake (Old way)
Capture Handshake:
Crack with Hashcat:
Link to this headingCracking
To crack WPA/WPA2 from airolib-ng database
To crack WPA/WPA2 from a wordlist
To crack a given bssid
To crack a given bssid using FMS/Korek method