Тёмный

Wireless Authentication and Key Generation 

Brett Hill
Подписаться 495
Просмотров 90 тыс.
50% 1

A walk through wireless authentication using both WPA/WPA2 PSK and 802.1x, and a look at where our encryption keys come from.

Наука

Опубликовано:

 

18 июл 2014

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 72   
@supadupahilton6848
@supadupahilton6848 4 года назад
Easily the BEST explanation of the 4 - way handshake I've come across! - Thank you!!!
@esepulvedar
@esepulvedar 8 лет назад
Thank you so much, I've been looking for this explanation for a month, very good, simple and complete.
@ahameda1224
@ahameda1224 5 лет назад
One of the best and simplest explanation ever. Thank you Brett :-)
@art_faith
@art_faith 2 года назад
Awesome abstract explanation! Thank you very much! Just one thing, PSK is not passphrase, but is derived from passphrase and SSID. So, in WPA-PSK, PSK = KDF(passphrase, SSID, 4096 times, 256 bit); PMK = PSK.
@prathiks067
@prathiks067 3 месяца назад
Great Explanation please continue the videos. 🙏
@PALTUBABY
@PALTUBABY 7 лет назад
The concept and unique value proposition of 802.1X over WPA/WPA2 with PSK has been clearly explained and along with good diagrams. The entire concept of 802.1X is complicated . But Brett has explained it redundantly so that it gets into the mind of the listener :). Thank you Brett for such a nice video :)
@JiriBrejcha
@JiriBrejcha 7 лет назад
Thank you very much, Brett! Very well done and explained, sir.
@rumblepoke1598
@rumblepoke1598 3 года назад
Many thanks for making all this puzzle understandable!
@richardk321
@richardk321 5 лет назад
It explains the difference between WPA/WPA2 and 802.1X Authentication Process clearly. Thanks for your contribution !
@semay2
@semay2 9 лет назад
Thank you so much for all the effort you put into this video. This is a great video.
@bretthillsmusic
@bretthillsmusic 8 лет назад
+SM Semaiawi Thank you for the comment. It is great to be able to help you learn and understand.
@Pioneerkartik02
@Pioneerkartik02 5 лет назад
excellent one sir...wherever u are...god bless u !
@ammaryasir9214
@ammaryasir9214 2 года назад
The best explanation of 802.1x authentication on WIFI so far, thank you sir! :)
@mauryavijay7429
@mauryavijay7429 6 лет назад
Excellent Video to describe the difference between WPA/WPA2 Vs 802.1x Authentication. God Bless you for this wonderful explanation
@bigo025
@bigo025 5 лет назад
Great Explanation... 50% of my presentation about Wireless security next week, will come from this video. Thank a lot from Belgium...
@lasause4348
@lasause4348 5 лет назад
ULB ?
@garysmith457
@garysmith457 8 лет назад
Really well done!! Thanks Brett.
@usavarma
@usavarma 9 лет назад
Thank you very much.. Very useful and nice video made 802.1x easy..
@bretthillsmusic
@bretthillsmusic 8 лет назад
+Aditya Varma You're welcome. Glad I could help out.
@blancavega9986
@blancavega9986 7 лет назад
Very clear, Very handdy and understandable!!! thanks a lot Buddy!
@zsolovyev
@zsolovyev 6 лет назад
An excellent explanation! Thank you! :)
@EhssanHJan
@EhssanHJan 4 года назад
Awesome. Great video. We need more of this
@gowthamraj7113
@gowthamraj7113 8 лет назад
tnk u so much ,3 weeks i have been stdying this but within a 24 min u ,did it man,, tnk you:)))
@fizzyfun8008
@fizzyfun8008 9 лет назад
This is a really good explanation. Thank you!
@bretthillsmusic
@bretthillsmusic 8 лет назад
+Fizzy Fun It is my pleasure to help out. Glad you enjoyed it.
@rusdilatif
@rusdilatif 3 года назад
great explanation ! great video. thank you Brett
@georgespiliopoulos5709
@georgespiliopoulos5709 8 лет назад
Thank you very much Brett, amazing video!
@bretthillsmusic
@bretthillsmusic 8 лет назад
+George Spiliopoulos You are welcome. Thank you for watching.
@shashankmoreshwar6594
@shashankmoreshwar6594 6 лет назад
Absolutely brilliant!
@lakmalcaldera847
@lakmalcaldera847 8 лет назад
Thanks for a great video!! Was really helpful!!
@htetlwinu
@htetlwinu 2 года назад
Nice and clear explanation. Thank you!
@aquibkhan2314
@aquibkhan2314 7 лет назад
Nice video brother..very much helpful for understanding the concept..great work..:)
@adaontheblock4274
@adaontheblock4274 2 года назад
This is great !! Keep sharing 🙏🏻 thank you 😊
@resetsever
@resetsever 2 года назад
This is outstanding, thank you so much
@manojreddy3036
@manojreddy3036 7 лет назад
Great Explanation...!! Thank You Very Much...!! Keep Going..!! :-)
@vibhavnanda2277
@vibhavnanda2277 6 лет назад
Complex concepts were explained in a simple fashion. Great work, Thank you!
@MGPfilm
@MGPfilm 8 лет назад
@Brett: Thank you verry much for feedback! Michael
@mnksh22
@mnksh22 7 лет назад
Awesome Explanation..Thanks
@slaps1
@slaps1 7 лет назад
Great explanation!
@dhruvbhatia
@dhruvbhatia 7 лет назад
Waoo! This is awesome!
@paranomic
@paranomic 6 лет назад
Good explantion ! Well done
@subbu0111
@subbu0111 8 лет назад
Awesome video :)
@citizensnipsnw
@citizensnipsnw 5 лет назад
fantastic video
@weizhang1346
@weizhang1346 3 года назад
Thanks! It's pretty clear.
@bernard0lr
@bernard0lr 8 лет назад
Thank you very much for this video :)
@bretthillsmusic
@bretthillsmusic 8 лет назад
+Bernardo Lima My pleasure. Glad you enjoyed it.
@anurageee
@anurageee 8 лет назад
classic thanks fr elaborated session
@Vinnodkr
@Vinnodkr 3 года назад
Very well explained,
@samanthsam5226
@samanthsam5226 4 года назад
Nicely done.....
@moolchandtyagi5817
@moolchandtyagi5817 5 лет назад
great talk. thanks
@gopimarvathi3733
@gopimarvathi3733 4 года назад
more videos coming? i loved your explanation
@naWIN540
@naWIN540 3 года назад
You are awesome
@bharatpenumutchu6487
@bharatpenumutchu6487 8 лет назад
Bert, great video my friend!!!!! But this is where i am lost how is the Master key generated , yes you have the EAP exchange but then hard to grasp how MK is derived. Thanks!!!!! But overall awesome video..The point you made about the Open System Authentication PSK is a master stroke :) .
@RahulSharma-rh5fv
@RahulSharma-rh5fv 3 года назад
Hi Brett, Thanks for the wonderful explanation. Just wondering, why didn't you create anymore videos on WLAN training. This video is GOLD. :)
@ernestbrant
@ernestbrant 8 лет назад
Great video, very will explained. One question if you see my feedback. If using a certificate (e.g. standard x509 client authentication certificate), I assume the RADIUS challenge to the supplication basically works by the RADIUS server taking a copy of the user certificate from active directory, using the public key within the certificate to encrypt a random value (nonce) send this the the supplicant who then de-crypts with the private key (which only the supplicant has) related to cert. Then the supplicant can re-encrypt this same value with the RADIUS Server certificate send back as the response to the challenge, then when the RADIUS server de-crypt the response with its private key (which again on the RADIUS server has) and it the response matches the challenge then the RADIUS server knows it is talking to the owner of the certificate (and not someone which just copied the certificate). Is that correct? Thanks Ernie
@benedictjojo5761
@benedictjojo5761 2 года назад
very good information
@jtlee6321
@jtlee6321 6 лет назад
잘듣고 갑니다 ㅎㅎ
@Pizza4eversf
@Pizza4eversf 5 лет назад
Many thanks.
@bharathkumar2175
@bharathkumar2175 4 года назад
Nice video
@rajr9285
@rajr9285 3 года назад
Thankyou man
@makharsa12
@makharsa12 7 лет назад
good video ..
@paxdriver
@paxdriver 5 лет назад
ty
@vigneshg7841
@vigneshg7841 3 года назад
Would be helpful if you can explain how msk is derived by authentication server?
@jayapriya9875
@jayapriya9875 3 года назад
I am having doubt like whther this EAPOL handshaking happens only for WPA2 and WPA enterprise ?. as we are doing this after handshaking with radius server, normlay radius will come for enterprise only right ??
@jonsultana4190
@jonsultana4190 5 лет назад
10/10
@cuddlemeheywoodu
@cuddlemeheywoodu 6 лет назад
Purely out of curiousity, which accent is this? I'm confused, it sometimes sounds Australian (in my ears, that is), then it sounds like it's from the Southern US, which got me intrigued. I'm no native English speaker, so recognizing accents isn't my strongsuit.
@samsegurazramyi314
@samsegurazramyi314 6 лет назад
MXS Sent me here
@MGPfilm
@MGPfilm 8 лет назад
@Brett: Pairwise Master Key - every Clients get the same Pairwise Master Key ? WPA2 use PASSWORD BASED KEY DERIVATION FUNCTION 2 So the Preshared Key Value is the Password and will be hased ( PUBLIC-KEY CRYPTOGRAPHY STANDARD 5 Version 2.0 ) with SSID + Lenght of SSID. Is the hash sum really every time the same result=same 256bit Pairwise Master Key ? Pairwise Master Key will use for 384bit PairwiseTransientKey PairwiseTransientKey will use for 128bit+128bitEAPOL + 128bitSessionKey/MIC Key
@bretthillsmusic
@bretthillsmusic 8 лет назад
+MGPfilm The pairwise master key will be the same each time for every client in pre-shared key authentication. The pairwise transient key comes in the 4-way hand shake and is used as the encryption key to encrypt your data packets. EAPoL is during the EAP process of 802.1x and not pre-shared key authentication. Once the EAP authentication process is complete, the EAP tunnel is taken down because the authentication process is over and the Pairwise master key has been created. Once the EAP session is over, The pairwise Master Key is used to generate the pairwise transient key during the 4-way handshake. After the 4-way handshake is complete, and the pairwise transient key is generated, the controlled port opens and data can be encrypted and passed across the network. The data is encrypted with the pairwise transient key. The strength of your pairwise transient key is based on how it was derived. In 802.1x EAP authentication, every device gets a different session key protected in the EAP process and each client has a unique pairwise master key resulting in a unique pairwise transient key. In pre-shared key authentication you do not have the EAP process, the pairwise master key is the same for everyone and no EAP process to generate unique keys. I hope this helps, and thanks for watching.
@prathiks067
@prathiks067 2 года назад
Nice and clear explanation. Thank you!
Далее
How Secure is YOUR WiFi Network?
35:44
Просмотров 15 тыс.
802.1X Authentication and 4-Way Handshake for WiFi
12:53
Почему худеют от Оземпик?
00:37
Просмотров 35 тыс.
Блиц по трекам ❤️
00:50
Просмотров 77 тыс.
802.11 Frame Analysis
34:01
Просмотров 43 тыс.
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Encryption - Differences Between WEP and WPA
7:23
Просмотров 16 тыс.
WiFi Security: What is WEP, WPA, and WPA2
6:39
Просмотров 33 тыс.
The 4-Way Handshake (Marcus Burton, CWNP)
6:13
Просмотров 112 тыс.
Five Fundamentals of RF You Must Know for WLAN Success
31:31
25   802 1x and EAP Concepts
14:40
Просмотров 7 тыс.
OFDMA: The Key Technology of 802.11ax
36:15
Просмотров 38 тыс.