Questions tagged [wpa]

76 questions
36
votes
3 answers

Can other people on an encrypted Wi-Fi AP see what you're doing?

If you connect to an open, unencrypted Wi-Fi access point, everything you do can be captured by other people within range. If you connect to an encrypted point, then people nearby can intercept what you're doing, but can't decrypt it. The person…
endolith
  • 7,704
17
votes
2 answers

How can I download the certificate of a wireless AP using 802.1X?

As far as I understand, wireless access points using WPA-Enterprise (i.e. WPA plus 802.1X) can send a public key certificate to a client during connection setup. The client can verify this certificate to make sure it is not connecting to a rogue AP…
sleske
  • 23,525
14
votes
4 answers

Wireshark WPA 4-way handshake

From this wiki page: WPA and WPA2 use keys derived from an EAPOL handshake to encrypt traffic. Unless all four handshake packets are present for the session you're trying to decrypt, Wireshark won't be able to decrypt the traffic. You can use the…
cYrus
  • 22,335
13
votes
1 answer

WiFi QR Code format for WPA2/WPA3

I'm creating a new QR code for my WiFi guest network and with my new router it supports WPA2/WPA3 Personal (AES). I've tried multiple iterations of the auto-configuration format (which I can't find official documentation for?), but none works. I use…
12
votes
4 answers

What does WPA/WPA2 really encrypt?

I have WPA2-personal on my laptop and I'm connected wirelessly to my home AP. The traffic I capture from Wireshark is all unencrypted. Some days ago I had my router on WPA-personal and did a MITM attack on my smartphone and the traffic was…
10
votes
2 answers

What are the technical requirements for a WPA-PSK passphrase?

I was thinking of generating a WPA-PSK passphrase, and I see in the OpenBSD manpage for wpa-psk(8): The passphrase must be a sequence of between 8 and 63 ASCII-encoded characters. What exactly is the criteria for "ASCII-encoded" here? Just that…
asveikau
  • 233
9
votes
2 answers

WPA vs. WPA2: Exception for one device?

My home network uses a Verizon-branded Actiontec M1424WR router with Wi-Fi. My main computer is hard-wired and lacks Wi-Fi capability. I'm trying to connect an old Palm TX, which has Wi-Fi, via the network. The router is set up for WPA2, and there…
fixer1234
  • 28,064
9
votes
1 answer

What is PMKID? Why would even a router give away the PMKID to an unauthorized stranger?

I do have a general understanding of the 4-way handshake in WPA and WPA2 security. I know about PMK, PTK, GMK, GMK, SNONCE, etc terminologies. I also read about the new PMKID attack more silent than the legacy handshake capture method. What I don't…
9
votes
1 answer

Raspberry pi wpa_supplicant can't connect on a specific wifi. CTRL-EVENT-ASSOC-REJECT status_code = 16

I'm having trouble connecting to a specific wifi using raspberry pi. Here is the output when I check /var/log/syslog: Jun 19 09:44:52 raspberrypi wpa_supplicant[447]: wlan0: Trying to associate with 86:2a:a8:2d:35:ea (SSID='XXXX Wi-Fi' freq=2462…
8
votes
4 answers

Why does encryption not destroy the way networks work?

I've a very basic understanding of how encryption works. My knowledge insofar is that of CCNA discovery level on the CISCO courses (along with a few other things such as Steve Gibson and Leo Laporte on "Security Now" in various episodes). My…
Dmatig
  • 1,700
7
votes
1 answer

Where can I find a full list of wpa-* options for the interfaces file?

I'm looking for an exhaustive list of wpa-* options that can be used in the /etc/network/interfaces file. The Debian wiki has a how-to-use page here: https://wiki.debian.org/WiFi/HowToUse, which refers to /usr/share/doc/wpasupplicant/README.modes.gz…
MatthewD
  • 343
5
votes
2 answers

Retrieve wpa_supplicant configuration generated by NetworkManager

I'm trying to debug a NetworkManager-powered wireless connection. It works when I feed wpa_supplicant with a custom wpa_supplicant.conf file written by me, but when I configure NetworkManager with the same parameters it does not work. I would like…
5
votes
4 answers

How secure is it to use a password hash of a common English word as a WPA2 key?

I have a wireless router, and I want a difficult password that is still, in a way, easy to remember. I came up with this idea to take the MD5, SHA-1, SHA-256, or whatever hash of a common English word, such as "superuser" and use the hash as the…
5
votes
3 answers

How Wifis and wifi security work?

I see tons of videos dealing with WEP cracking, but actaully none of them teach about how Wifis work. They are just a bunch of commands thrown at the screen. Where can I learn about the inner mechanics of wifis? Can you recommend a website or a…
user5210
  • 175
5
votes
1 answer

Sign-In to Network protocol

When I connect to a hotel network that does not require a WPA key, on my PC, the first browser access will be trapped and directed to the login page. This is understandable, and I can guess the network equipment provisions access by MAC address. On…
u936293
  • 1,337
1
2 3 4 5 6