Главная
Study mode:
on
1
Introduction
2
Dragonfly Handshake
3
How it works
4
What is a mod P group
5
A dictionary of passwords
6
Main takeaway message
7
Test setup
8
Eelliptic curves
9
WPA3 hashing
10
WPA3 countermeasure
11
Brainpool curves
12
If condition
13
Conclusion
14
Solution
15
Takeaway
16
Password Dictionary
17
Cost
18
Summary
19
Dragonfly implementations
20
Invalid curve attack
21
Curve check
22
Curve check as adversary
23
Guessing the key
24
EP PWD
25
Free Radius
26
Denial of Service
27
Downgrade Attacks
28
Downgrade Attack 2
29
S10 Patch
30
WiFi Standard Update
31
No More Timing Leaks
32
Possible Downgrade Attacks
33
Should You Use WPA3
34
Conclusions
Description:
Explore the vulnerabilities in WPA3's Dragonfly handshake and their practical implications in this comprehensive conference talk. Delve into the discovered attacks, including password partitioning attacks that exploit timing and cache-based side-channel leaks. Understand the efficiency and low cost of these attacks, with examples of brute-forcing 8-character lowercase passwords using Amazon EC2 instances. Examine backwards-compatible countermeasures and discuss why WPA3 may not meet modern security protocol standards, especially on devices with lightweight processors. Learn about the Dragonfly handshake, mod P groups, elliptic curves, and WPA3 hashing. Investigate invalid curve attacks, denial of service, and downgrade attacks. Evaluate the effectiveness of proposed solutions, WiFi standard updates, and the removal of timing leaks. Gain insights into the future of WPA3 and draw conclusions about its security implications for Wi-Fi networks.

Weaknesses in WPA3's Dragonfly Handshake

BruCON Security Conference
Add to list