Тёмный

Aruba WPA3: The New Standard for Wi Fi Security 

Tech Field Day
Подписаться 56 тыс.
Просмотров 11 тыс.
50% 1

Explore how 2 innovative new standards fix WPA2 flaws and provide robust security for next gen Wi-Fi. Also included is a demonstration of how WPA3 can encrypted sessions from the start of the association process and secure user data before it can be exposed.
Presented By: Dan Harkins, HPE Fellow & Office of the CTO
Recorded at Security Field Day 1 in San Jose, CA on December 14, 2018. For more information, please visit www.arubanetworks.com/ or TechFieldDay.com/event/xfd1

Наука

Опубликовано:

 

30 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 15   
@wweghorst
@wweghorst 5 лет назад
Please close the microphone of people not presenting in the future to prevent all kind of disturbing sounds.
@techieSudhakar
@techieSudhakar 3 года назад
Good Content and wonderful presentation on WPA3. Thanks!
@richardherwig2136
@richardherwig2136 2 года назад
I really wish they had a formal process for questions. The one snide guy who keeps interrupting combined with the whispering and noises was distracting. The equally snide comments in the comment section really add nothing to the conversation, too. Par for the course, I guess. Still, good presentation and a great start for an open discussion on its merits.
@wildyato3737
@wildyato3737 2 года назад
Tell me something You did manage to prevent manipulate the management frames..but what if the Victim left the AP/router on with WPA3 enabled and Attacker is already flooding deauth ayyacks on it...what will client do? Second Even if the Handshake process of SAE won't let the passkey to be Bruteforce ..but can be downgraded? even with WPA3 mode only Cuase communication I think if someone removed SAE protocols from it and remain the old WPA Handshake it would be possible?..
@cpuuk
@cpuuk Год назад
Maybe 2023 they will get this out officially.
@WR3ND
@WR3ND 2 года назад
7:42 My private WPA2-Personal PSKs are 1 of 47,672,401,706,823,533,450,263,330,816 - 16 random capital and lower case alphanumeric characters. Do you think that's good enough for the time being? I use WPA3 as well, but most all devices don't use it yet so I have separated guest networks, using either only WPA2 or only WPA3, not cross compatible WPA2/WPA3-Personal.
@wildyato3737
@wildyato3737 2 года назад
Wait are you saying most Iot device doesn't support WPA3 yet?.😳 What are OEM and other vendors doing?.. Even Aliance said it is mandatory form WiFi 6 neworks😳
@wildyato3737
@wildyato3737 2 года назад
You did a good thing to do that..well it's okay and Even people recommend this..🤔 So what you think you are protected or not .. it's upto you.
@WR3ND
@WR3ND 2 года назад
@@wildyato3737 I thought he was referring to brute force and dictionary lookup attacks, which can be hardened against with strong passwords. So, I am wondering if there are other vulnerabilities, or if he was just scare mongering.
@WR3ND
@WR3ND 2 года назад
@@wildyato3737 It isn't mandatory to use WPA3 on Wi-Fi 6 on clients, just that the option is there on access points and similar. They want backwards compatibility. You can even use hybrid WPA2/3 that can use either to connect to the same SSID, though this seems inherently compromised to an extent to me, so I don't use it, just WPA2 or WPA3 on separate guest networks.
@wildyato3737
@wildyato3737 2 года назад
@@WR3ND Well From what I heard all about this standard...it still has flaws.. Indeed they mentioned the protection by using PMF to prevent flood attacks but wjat If Attacker may already have Flooding on a particular network to prevent connecting to clients anymore.. when starting the AP through power... Even There is no password detection system.. that some has really bhot your key..but when the attacker is inside of your network..😒 There Must be a somekind of table that only legitimate device has password. and locked the table...if anyone got password.. There will be Red light showing at LED lights...💀😂
@MikeTrieu
@MikeTrieu 5 лет назад
So he's one of the guys we have to blame for the Dragonblood vulnerabilities. Awesome.
@aknightofgod
@aknightofgod 2 года назад
and now 4 years later, adoption is great, amazing how fast technology moves. 6GHz coming :)
@joyceandchrisaccount3644
@joyceandchrisaccount3644 4 года назад
Too bad wpa3 security is broken. Almost like a spy agency designed it to be unsecured from the get go. Who would have thunk the first two iterations of wpa3 both used some form of elliptical curve encryption?
Далее
▼КОРОЛЬ СОЖРАЛ ВСЕХ 👑🍗
29:48
Просмотров 358 тыс.
Штаны легионера
00:44
Просмотров 123 тыс.
WPA3, OWE and DPP | Hemant Chaskar | WLPC Phoenix 2019
52:53
Hacking WPA3 with Mathy Vanhoef & Retia
8:07
Просмотров 67 тыс.
Kerberos Authentication Explained | A deep dive
16:52
Просмотров 334 тыс.
IEEE 802 11kvr | Perry Correll | WLPC Phoenix 2019
40:01
802.11ax - What's New Webinar
31:42
Просмотров 27 тыс.
WPA3 - Advancements in Wireless Security
40:01
Просмотров 1,9 тыс.
Transport Layer Security (TLS) - Computerphile
15:33
Просмотров 473 тыс.
802.11ax and OFDMA | Perry Correll | WLPC Prague 2018
54:18