ISAC Cambodia (InfoSec)
Video

Wireless LAN Security Mega-Primer Part 8: Hacking WLAN Authentication

In this video, we will learn how to hack through various WLAN Authentication schemas – Open and Shared Authentication. As many of you may have guessed Open Authentication is a dud 🙂 and nothing much to explore there apart from corner cases like using MAC address filtering like in the previous video. The focus of this video is breaking shared key authentication.

Shared Key Authentication (SKA) requires the use of WEP encryption and is fundamentally flawed. Its comes as a surprise to me how the IEEE committee let this slip past them during the design of the 802.11 security aspects. To beat SKA, a hacker has to collect the challenge text sent by the access point and the encrypted response sent by the client. He will then XOR both these data values to derive the keystream for the Initialization Vector (IV) and the WEP key. He can then use this to authenticate any challenge sent by the access point to him. We will do a live demo of these concepts in this video!

Show More
Apsara Media Services (AMS)

Phannarith

Mr. OU Phannarith is one of the well-known cybersecurity experts in Cambodia and the region. He is the founder of the first leading information security website (www.secudemy.com) in Cambodia. He has been invited to present in global conferences, forums, and seminars and he was awarded in Information Security Leadership Achievements (ISLA) in 2016 by (ISC)2 and in December 2012 as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Group (IDG). Mr. OU has been the Professor specializing in Cybersecurity.

Related Articles

Back to top button