Thank you so much! I decided to start learning about ALL the things we take for granted. It's amazing how many people connect, and use computers and have no idea how it works
At last someone who sounds like they know what they're talking about. Easy to understand when broken into their basic parts. Thanks for the clear explanation.
Great video thank you. You cleared this up. I was getting confused with the 4-way handshake vs EAPOL. EAPOL is similar but for enterprise setups that use Radius Servers.
Great video!!!!! However, we need to understand how the authentication frame work works. The Key exchange (PSK, PKI, CA) , it would have been nice to dwelve on this as well......
just a simple supid question , does that mean if you have the psk key (or pmk ) let's say you're on the same wireless network , does that mean you can intercept and mimic the process and get the PTK and GTK and decrypt all data communicated ?? i'm a newbie don't go harsh on me i can be stupid somtimes xDD
Hi Marcus, Thanks for this short and meaningful explanation .I have one query when user enters wrong password then at which stage it will validate this and authentication getting failed.?
Hi, i am working on bachelor thesis and i am little bit confused... You are talking about Group Temporal Key, but in other sources its Group Transient Key.
Thanks for the well described video.. Please answer my below question. In M1 A.P sends a PMK ID to client. Will the client caches this PMKID for future use or client generates PMKID it self after M2 as I has all the required materia.
Hi, thank you for content, I have a question though! can't someone just derive someone's PTK since the anonce and snonce message are not encrypted? Doesn't anyone have access to the 5 values of everyone??
The snonce is not encrypted. The Mic does only secure the integrity not the confidentiality. The only secret in this process is the pmk from the authentication server.
I think GTK is sent encrypted (with PTK), according to this link: mrncciew.com/2014/08/19/cwsp-4-way-handshake/. It makes sense for it to be that way. Marcus may have just forgotten to mention that.
Great video, unfortunately, it's oversimplifying it a bit too much. The GTK exchange is not part of the 4-way handshake, and the model he draws are thus missing two messages. For those interested, here's a more formally correct version of the 4-way handshake (4WHS): -- 1: Authenticator sends: Anonce, IDa, SQN 2: Supplicant sends: (Snonce, IDs, RSN IE, SQN) + MIC 3: Authenticator sends: (Anonoce, IDa, RSN IE, SQN +1) + MIC 4: Supplicant sends: (IDs, SQN +1) + MIC -- //Acronyms: IDa = Macaddress of authenticator // Needed to derive PTK IDs = Macaddress of supplicant //Needed to derive PTK PTK = Pariwise Transient Key SQN = Sequence number // Used to stop replay attacks RSN IE = Robust Security Network Information Element. Basically which cipher suites are supported by the entity. MIC = Message Integrity Code // Used to prove integrity of the message and authentication of the sender.
I'm here because I'm in training to become a better wireless network engineer. I came across this topic because the other resource I have did not explain this subject well.
My point is that this topic makes perfect sense if you have other wireless network resources. People don't make entire video lectures on this topic for free. There probably is a precursor video, the real question is, are you ready to pay for it? I overshared about my situation to address the question of who is the target audience for a seemingly random video such as the one here. In the context of someone with multiple resources on the topic, this video is an excellent supplement. Sorry that it was not what you were looking for. Why not go to www.cwnp.com and see if you can find a complete video lecture. Considering how unhelpful it was for you to watch this, I suggest you look in the CWNA topics.
Terrible. This instruction video had no structure. He couldn't stick to the subject. He kept getting off the subject by adding side notes, which made it impossible to follow.