thanks for the video, I always wondered what is it that's preventing me from getting connected to a wifi network without a password. Hope to see some more info videos like this.
@NizarARida3 жыл бұрын
Very good in depth explanations.. seeking more and more of this!
@Psychaotix20015 жыл бұрын
It's good to be able to see this sort of information come across. Now I understand a little better how wireless devices authenticate. Also, do you think you may be able to do a video on how to clone a repository for linux? I've got a feeling that it would be useful for people who don't have a stable net connection
@leeritenour4 жыл бұрын
Great video, but where is the fourth way? Was the explanation of the message 4 skipped?
@saikasibatla65732 жыл бұрын
Hey, very good info.... I have similar issue where my PSK I'm giving on my laptop is correct but the M3 is not generating in the Wireshark packets, suspecting an issue from encryption keys...any help here please?
@dmitrylitovchenko23655 жыл бұрын
Hm, PSK is used as an authentication method, while the rest of the components for the PTK are sent in clear text in 4-way handshake. I'm confused why to use this method for deriving encryption keys. Something like public key exchange would be much more secure (may be like IPsec phase 1).
@Khangbng4 жыл бұрын
Thank you for the great explanation. Also I got a question, since this 4-way handshake works based on the EAPoL framework, does it mean in the Message 2 frame, the Supplicant send its PMK (PSK) in this frame as well? So the AP can check if the PSK is correct? If the PMK is correct then the AP will continue the Handshake process and send back the Message 3. If not then the AP terminates the Authentication process. I’m not sure if my understanding is correct
@CZRaS3 жыл бұрын
no PMK/PSK is never transmitted over network. Both sides verify that the opposite side knows PMK by calculating MIC over EAPoL packet using generated PTK. If they matches, then they know the oppisite side has calculated same PTK == had PMK
@techevangelist83734 жыл бұрын
Can you do a video on de-auth and disassociation message alone. I am not getting those concept. CWSP text says, it's a notification message. Can you elaborate on that? Btw, your videos are good
@ahmedw54 жыл бұрын
Thanks for the explanation!
@davidr.flores20434 жыл бұрын
Hey man, thanks a lot for this tutorial, it was great, although we missed packet 4 oops, it's ok. Cheers
@jonny94253 жыл бұрын
Thanks for the video! You answered every question I came here with.
@TimSumpton5 жыл бұрын
So a deauth attack would be a way to capture the 4-way handshake, and then be able to decrypt traffic? or would you still need to know the PSK?
@dmitrylitovchenko23655 жыл бұрын
You still need to know the PSK
@Enneti3 жыл бұрын
Can't anyone generate PTK of anyone since he can just access the anonce and snonce messages since they are not encrypted???
@TallPaulTech3 жыл бұрын
Yes. As long as they captured those, and know the passphrase. I've done a video on how to use that in Wireshark to look at enctyped traffic.
@Enneti3 жыл бұрын
@@TallPaulTech thank you very much!
@AlexLucard4 жыл бұрын
Please stay on the screen so we can see wireshark and what you are talking about . I don't care what you look like
@TallPaulTech4 жыл бұрын
I don't care what you care about, so feel free to go and fuck yourself.
@Shan-gn7mg4 жыл бұрын
@@TallPaulTech you are no better than him...
@AlexLucard4 жыл бұрын
@@TallPaulTech Oh I'm so sorry that I hurt the narcissist feelings
@naineeowo14694 жыл бұрын
@@TallPaulTech lol
@swagmaster20794 жыл бұрын
so who's gon tell him he can pause it?
@AlexLucard4 жыл бұрын
In the future when you're doing these videos can you keep the camera or the video on the screen yes you're very pretty but it doesn't help me learn anything to look at your face I need to see the screen