Тёмный

WPA-3: SAE and Dragonfly 

Bill Buchanan OBE
Подписаться 15 тыс.
Просмотров 11 тыс.
50% 1

Web page: asecuritysite.com/encryption/...
Medium: medium.com/asecuritysite-when...

Опубликовано:

 

5 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 14   
@visheshsobti6741
@visheshsobti6741 2 года назад
Amazing explanation. I was very confused with SAE and you made it abundantly clear. Thank you!
@erikb.2514
@erikb.2514 2 года назад
Actually it is best SAE explanation what i have seen on the RU-vid!
@peterjohnson8279
@peterjohnson8279 2 года назад
That is a excellent explanation! Thanks
@pabloberlanga97
@pabloberlanga97 4 года назад
thank you for sharing this!
@abuhamza2219
@abuhamza2219 5 лет назад
wonderful
@fyodor8008
@fyodor8008 2 года назад
Now this is a good video. It's a shame it has barely any views
@An.Individual
@An.Individual 3 года назад
Terrific video. 6:43 I am left wondering if SAE/Dragonfly is really this simple?
@sherazahmad478
@sherazahmad478 5 лет назад
mannn! your video is amazing, I have seen hundreds of sh**** videos before your video, why few views
@infideaglobal7557
@infideaglobal7557 4 года назад
instead of whispering talk loudly please. this will give you more subs
@An.Individual
@An.Individual 3 года назад
Theodore Roosevelt’s said "speak softly and carry a big stick; you will go far"
@An.Individual
@An.Individual 4 года назад
11:36 Bill B. states that WPA2 is no longer fit for purpose. I got hold of KALI, captured the 4 way handshake on my my WPA2 home network and tried to crack the password, I gave up after 24 hours. WPA2 is not as bad as he is saying.
@BillBuchanan
@BillBuchanan 4 года назад
It is well known that the four-way handshake is weak, and needs to be replaced. The strength all depends on the rules used in Hashcat. If the password is in a dictionary or has simple rules applied (such as adding a numeric value at the end), it can be cracked in a fairly short time. PBKDF2 will give a throughput of a few thousand passwords tried every second on a simple processor, but that can increase to over 400,000 hashes per second using a GPU. miro.medium.com/max/2752/0*yQsLhJpVVF2tcPlG If we use a cluster of GPUs we can get this up to millions of tried passwords per second.
@An.Individual
@An.Individual 3 года назад
@@BillBuchanan There are 95 printable characters in ASCII. The number of different 10 character random password is 95 to the power 10 = 6 * 10 to the 19 = 46 million years at 1 million tries per second = reasonably secure I believe
@wayan1603
@wayan1603 3 года назад
@@An.Individual Given the fact that most people use very simple / insecure passwords, a simple dictionary attack or the use of precomputed rainbow tables can crack the password pretty easily for WPA2 Personal. Pure brute force attacks are seldom used today to crack any kind of passwords. This is why SEA / Dragonfly is used for WPA3 as it helps bring a higher security even if the password is weak.
Далее
WPA3 and OWE Wi-Fi Security
38:13
Просмотров 6 тыс.
Викторина от ПАПЫ 🆘 | WICSUR #shorts
00:56
WPA3, OWE and DPP | Hemant Chaskar | WLPC Phoenix 2019
52:53
Transport Layer Security (TLS) - Computerphile
15:33
Просмотров 474 тыс.
Should you be using WiFi 7 or WPA3? Best Wi-Fi setup?
27:20
Next-Gen Wi-Fi Security - WPA3 Explained
5:26
Просмотров 330 тыс.
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Hacking WPA3 with Mathy Vanhoef & Retia
8:07
Просмотров 67 тыс.
Why The Windows Phone Failed
24:08
Просмотров 218 тыс.