WPA3 is the latest Wi-Fi security protocol, but new research has found it can be attacked. In this video, explore the Dragonblood research and the attacks found on the WPA3 security protocol.
- [Instructor] Unfortunately for WPA3, the researchers … who created the crack attack on WPA2 … have been able to demonstrate that WPA3 … is vulnerable to a number of attacks … with a research and testing program known as Dragonsblood. … Their research initially identified timing leaks … and authentication bypasses in the WPA3 daemon, … and subsequently discovered downgrade … and denial of service attacks. … A number of side channel attacks were discovered, … including one which worked … even after the equipment was patched. … Interestingly, their research suggests … that for the expenditure of a dollar … on an Amazon EC2 instance, there would be enough … computing power to brute force crack the password. … Also interestingly, the design of WPA3 … did not address a known history of side channel leaks, … despite these being raised as concerns. … The researchers conclude that a minor change … to Dragonfly's password and coding algorithm, … removing the peer MAC address, would've prevented …
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic Wi-Fi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things