Тёмный

The 4-Way Handshake (Marcus Burton, CWNP) 

CWNPTV
Подписаться 21 тыс.
Просмотров 112 тыс.
50% 1

Marcus Burton, Director of Product Development at CWNP, teaches you the 802.11 4-way handshake.

Наука

Опубликовано:

 

4 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 46   
@usergroupX
@usergroupX 11 лет назад
Thank you so much! I decided to start learning about ALL the things we take for granted. It's amazing how many people connect, and use computers and have no idea how it works
@pearsemcguinness2472
@pearsemcguinness2472 9 лет назад
At last someone who sounds like they know what they're talking about. Easy to understand when broken into their basic parts. Thanks for the clear explanation.
@rohitrajkumar1234
@rohitrajkumar1234 6 лет назад
Thank you Marcus. Most Helpful.
@sibijohn3511
@sibijohn3511 6 лет назад
Thanks for the brief and precise explanation
@damiaorodrigues2680
@damiaorodrigues2680 7 лет назад
This was a good explanation. Thanks Marcus.
@googlesearches240
@googlesearches240 11 лет назад
Great video thank you. You cleared this up. I was getting confused with the 4-way handshake vs EAPOL. EAPOL is similar but for enterprise setups that use Radius Servers.
@blancavega9986
@blancavega9986 7 лет назад
Great Explanation! thank you buddy!
@ianpatrick23
@ianpatrick23 3 года назад
Great explanation! Thank you!
@Gokul4444
@Gokul4444 9 лет назад
Thank you Marcus. It would be good; if you add things about KEK, KCK, TK in this
@JamesR1chards
@JamesR1chards 12 лет назад
Thank you Marcus
@darylallen2485
@darylallen2485 7 лет назад
I found this helpful.
@nullsemicolon
@nullsemicolon 2 года назад
super good video on the subject!
@bharat5845
@bharat5845 5 лет назад
Is GTK sent in plain text (?) or its privacy is protected in some ways by the PTK? Thanks
@bharatpenumutchu6487
@bharatpenumutchu6487 8 лет назад
Great video!!!!! However, we need to understand how the authentication frame work works. The Key exchange (PSK, PKI, CA) , it would have been nice to dwelve on this as well......
@aminebrahmi8034
@aminebrahmi8034 6 лет назад
just a simple supid question , does that mean if you have the psk key (or pmk ) let's say you're on the same wireless network , does that mean you can intercept and mimic the process and get the PTK and GTK and decrypt all data communicated ?? i'm a newbie don't go harsh on me i can be stupid somtimes xDD
@mahavirmahajan5035
@mahavirmahajan5035 10 месяцев назад
Hi Marcus, Thanks for this short and meaningful explanation .I have one query when user enters wrong password then at which stage it will validate this and authentication getting failed.?
@kovalensue
@kovalensue 11 лет назад
Hi, i am working on bachelor thesis and i am little bit confused... You are talking about Group Temporal Key, but in other sources its Group Transient Key.
@ravikumar-lu2tp
@ravikumar-lu2tp 4 года назад
Thanks for the well described video.. Please answer my below question. In M1 A.P sends a PMK ID to client. Will the client caches this PMKID for future use or client generates PMKID it self after M2 as I has all the required materia.
@Vidur11
@Vidur11 4 года назад
The PMK ID is cached by the client to facilitate roaming between AP's.
@maitumbi31
@maitumbi31 6 лет назад
how can I get the video
@rajendrapanga68
@rajendrapanga68 2 года назад
Thank you
@Enneti
@Enneti 3 года назад
Hi, thank you for content, I have a question though! can't someone just derive someone's PTK since the anonce and snonce message are not encrypted? Doesn't anyone have access to the 5 values of everyone??
@AlisamiXploration
@AlisamiXploration 2 года назад
No, since the PMK is necessarily for deriving PTK and that is never shared wirelessly. (9 months later lmao)
@1Man2Go
@1Man2Go 8 лет назад
how does the AP decrypt the snonce? it's mic protected and it hasn't generated the PTK yet
@Qbabxtra
@Qbabxtra 6 лет назад
A bit late but here you go: The Snonce is sent in cleartext, with the MIC tag appended to the end of the message.
@hetbet3879
@hetbet3879 3 года назад
Trying to figure it out, tasked with this and only 15.. hella confusing.
@johnangelo2000
@johnangelo2000 12 лет назад
Please have EAPOL as well
@jagadeesh498
@jagadeesh498 6 лет назад
How Does AP get PMK ( Pairwise Master Key ) When 802.1x authentication is used
@Qbabxtra
@Qbabxtra 6 лет назад
I'm not 100% sure, but I assume both parties derive it from the only common secret they know: The supplicants password.
@sundsalharbi8817
@sundsalharbi8817 4 года назад
Thanks
@An.Individual
@An.Individual 3 года назад
what protects the client from a fake AP?
@valuevideoz4130
@valuevideoz4130 5 лет назад
4 way handshake simple explanation
@darkangelcloud7
@darkangelcloud7 10 лет назад
kerberos dude :)
@micha74741
@micha74741 8 лет назад
The snonce is not encrypted. The Mic does only secure the integrity not the confidentiality. The only secret in this process is the pmk from the authentication server.
@satselva
@satselva 7 лет назад
GTK is not encrypted , so will it be a problem...???
@damiaorodrigues2680
@damiaorodrigues2680 7 лет назад
I think GTK is sent encrypted (with PTK), according to this link: mrncciew.com/2014/08/19/cwsp-4-way-handshake/. It makes sense for it to be that way. Marcus may have just forgotten to mention that.
@Qbabxtra
@Qbabxtra 6 лет назад
The GTK is encrypted with the Key Encryption Key (KEK), which is one of the 3 keys the PTK is composed of.
@paul-sr8qk
@paul-sr8qk 4 года назад
There is always assholes in my area trying to hack my wifi you have gotta be vigilant.
@Qbabxtra
@Qbabxtra 6 лет назад
Great video, unfortunately, it's oversimplifying it a bit too much. The GTK exchange is not part of the 4-way handshake, and the model he draws are thus missing two messages. For those interested, here's a more formally correct version of the 4-way handshake (4WHS): -- 1: Authenticator sends: Anonce, IDa, SQN 2: Supplicant sends: (Snonce, IDs, RSN IE, SQN) + MIC 3: Authenticator sends: (Anonoce, IDa, RSN IE, SQN +1) + MIC 4: Supplicant sends: (IDs, SQN +1) + MIC -- //Acronyms: IDa = Macaddress of authenticator // Needed to derive PTK IDs = Macaddress of supplicant //Needed to derive PTK PTK = Pariwise Transient Key SQN = Sequence number // Used to stop replay attacks RSN IE = Robust Security Network Information Element. Basically which cipher suites are supported by the entity. MIC = Message Integrity Code // Used to prove integrity of the message and authentication of the sender.
@CWNPTV
@CWNPTV 6 лет назад
The GTK is transmitted during the 4WHS. The GTK exchange is used to transmit a new GTK to existing connections at a later time if required.
@HypnotizeCampPosse
@HypnotizeCampPosse 8 лет назад
was there a precursor video to this? I gained no information from watching this.
@darylallen2485
@darylallen2485 7 лет назад
I'm here because I'm in training to become a better wireless network engineer. I came across this topic because the other resource I have did not explain this subject well.
@HypnotizeCampPosse
@HypnotizeCampPosse 7 лет назад
+Daryl Allen pointless comment ^
@darylallen2485
@darylallen2485 7 лет назад
My point is that this topic makes perfect sense if you have other wireless network resources. People don't make entire video lectures on this topic for free. There probably is a precursor video, the real question is, are you ready to pay for it? I overshared about my situation to address the question of who is the target audience for a seemingly random video such as the one here. In the context of someone with multiple resources on the topic, this video is an excellent supplement. Sorry that it was not what you were looking for. Why not go to www.cwnp.com and see if you can find a complete video lecture. Considering how unhelpful it was for you to watch this, I suggest you look in the CWNA topics.
@michaeltaylor5939
@michaeltaylor5939 9 лет назад
Terrible. This instruction video had no structure. He couldn't stick to the subject. He kept getting off the subject by adding side notes, which made it impossible to follow.
Далее
Wireless Authentication and Key Generation
23:37
Просмотров 90 тыс.
Five Fundamentals of RF You Must Know for WLAN Success
31:31
🔴Ютуб закрывают... Пока?
00:39
Просмотров 1,8 млн
How TCP Works - The Handshake
13:53
Просмотров 308 тыс.
WiFi Roaming
10:49
Просмотров 85 тыс.
WPA and WPA2 (Marcus Burton, CWNP)
7:55
Просмотров 105 тыс.
Wi-Fi 4-Way Handshake In Depth
6:14
Просмотров 26 тыс.
OFDMA: The Key Technology of 802.11ax
36:15
Просмотров 38 тыс.
WPA/WPA2 4-way Handshake
5:56
Просмотров 7 тыс.
TCP - Three-way handshake in details
4:17
Просмотров 202 тыс.
Understanding WLAN Capacity
33:53
Просмотров 20 тыс.
КАКОЙ SAMSUNG КУПИТЬ В 2024 ГОДУ
14:59