Главная
Study mode:
on
1
Intro
2
Background: Wi-Fi Security
3
Background: Dragonfly in WPA3 and EAP-pwd
4
Hash-to-curve: EAP-pwd
5
Attacking Clients
6
Attacking Access Points
7
What information is leaked?
8
Leaked information: #iterations needed
9
Raspberry Pi 1 B+: differences are measurable
10
Hash-to-curve: WPA3
11
Cache attack on NIST curves
12
Password Brute-force Cost
13
Denial-of-Service Attack
14
Downgrade Attacks
15
Reaction of the Wi-Fi Alliance
16
Fundamental issue still unsolved
17
Remaining issues
18
Conclusion
Description:
Analyze the Dragonfly handshake protocol used in WPA3 and EAP-pwd Wi-Fi security standards. Explore vulnerabilities in the hash-to-curve algorithm, potential attacks on clients and access points, and information leakage risks. Examine the impact on password brute-force costs, denial-of-service possibilities, and downgrade attack scenarios. Evaluate the Wi-Fi Alliance's response to these security concerns and discuss remaining issues in Wi-Fi security implementation. Gain insights into the fundamental challenges of securing wireless networks and the ongoing efforts to address vulnerabilities in widely-used protocols.

Dragonblood - Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd

IEEE
Add to list
0:00 / 0:00