The 4-Way Handshake (Marcus Burton, CWNP)

preview_player
Показать описание
Marcus Burton, Director of Product Development at CWNP, teaches you the 802.11 4-way handshake.
Рекомендации по теме
Комментарии
Автор

Thank you so much! I decided to start learning about ALL the things we take for granted. It's amazing how many people connect, and use computers and have no idea how it works

usergroupX
Автор

At last someone who sounds like they know what they're talking about. Easy to understand when broken into their basic parts. Thanks for the clear explanation.

pearsemcguinness
Автор

Hi Marcus, Thanks for this short and meaningful explanation .I have one query when user enters wrong password then at which stage it will validate this and authentication getting failed.?

mahavirmahajan
Автор

Great However, we need to understand how the authentication frame work works. The Key exchange (PSK, PKI, CA), it would have been nice to dwelve on this as

bharatpenumutchu
Автор

Thanks for the brief and precise explanation

sibijohn
Автор

Thank you Marcus. It would be good; if you add things about KEK, KCK, TK in this

Gokul
Автор

This was a good explanation. Thanks Marcus.

damiaorodrigues
Автор

Great video thank you. You cleared this up. I was getting confused with the 4-way handshake vs EAPOL. EAPOL is similar but for enterprise setups that use Radius Servers.

googlesearches
Автор

Thanks for the well described video.. Please answer my below question.
In M1 A.P sends a PMK ID to client. Will the client caches this PMKID for future use or client generates PMKID it self after M2 as I has all the required materia.

ravikumar-lutp
Автор

Trying to figure it out, tasked with this and only 15.. hella confusing.

hetbet
Автор

just a simple supid question, does that mean if you have the psk key (or pmk ) let's say you're on the same wireless network, does that mean you can intercept and mimic the process and get the PTK and GTK and decrypt all data communicated ?? i'm a newbie don't go harsh on me i can be stupid somtimes xDD

aminebrahmi
Автор

what protects the client from a fake AP?

An.Individual
Автор

Hi, thank you for content, I have a question though! can't someone just derive someone's PTK since the anonce and snonce message are not encrypted? Doesn't anyone have access to the 5 values of everyone??

Enneti
Автор

Is GTK sent in plain text (?) or its privacy is protected in some ways by the PTK?
Thanks

bharat
Автор

Hi, i am working on bachelor thesis and i am little bit confused... You are talking about Group Temporal Key, but in other sources its Group Transient Key.

kovalensue
Автор

The snonce is not encrypted. The Mic does only secure the integrity not the confidentiality. The only secret in this process is the pmk from the authentication server.

micha
Автор

how does the AP decrypt the snonce? it's mic protected and it hasn't generated the PTK yet

ManGo
Автор

How Does AP get PMK ( Pairwise Master Key ) When 802.1x authentication is used

jagadeesh
Автор

GTK is not encrypted, so will it be a problem...???

satselva
Автор

There is always assholes in my area trying to hack my wifi you have gotta be vigilant.

paul-srqk
join shbcf.ru