New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WPA3 documents and specifications #1915
Comments
WPA3 uses the dragonfly handshake which is designed to be resistant to offline dictionary attacks. |
FWIW: https://tools.ietf.org/html/rfc7664 is the dragonfly KEX RFC |
There's a new method for WPA2 cracking available which was found under WPA3 cracking method researching. |
@kcdtv more notes which may be interesting for you to look at |
tl;dr — I think a new feature request should be opened (to add the algorithm to |
Yeah, just to clarify: The above new attack applies to WPA2 while investigating WPA3. There still isn't a known (published) offline WPA3 attack. |
New issue report / feature request opened. Thanks |
Nice! Thanks so much kimocoder for letting me know about this new attack vs WPA2 and letting me know about this thread. I'll dive into that when i am back from holiday in a couple of weeks.
|
SAE is already in mac80211 AFAIK since 802.11s already uses it. There are probably some adapation needed so no idea when WPA3 will land in wpa_supplicant. Following the commits in their repo would be the way to go by checking for test suite updates (wpa_supplicant and hostapd share some common code). |
They've allready started the implementation on hostap & wpa_supplicant. |
I knew that both projects were launched originally by Jouni Malinen but i was not sure if he still was the wifi man. It looks like that is the case. Very good! The repo is still "w1.fi", some exiting testing to do. 😺 |
We got lots more information on several attack possibilities Side-channel-attack and timing based attacks CVE-2019-9494 https://amp.thehackernews.com/thn/2019/04/wpa3-hack-wifi-password.html?__twitter_impression=true |
There are some more details in this one: https://www.zdnet.com/article/dragonblood-vulnerabilities-disclosed-in-wifi-wpa3-standard/ |
WPA3 specification sheet and documents may be found here
Just a informational notice. Thanks.
The text was updated successfully, but these errors were encountered: