We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Simulation of MITM in PEAP with hostap

Formale Metadaten

Titel
Simulation of MITM in PEAP with hostap
Untertitel
application of EAP state machines from hostap for MITM simulation
Serientitel
Anzahl der Teile
611
Autor
Lizenz
CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache
Produktionsjahr2017

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
It's a talk about MITM in Tunneled Authentication Protocols and its consequentimplementation with a help of hostap project. The research is not original andyou may find a deeper overview in the paper: Pieter Robyns, Bram Bonné, PeterQuax, Wim Lamotte, Exploiting WPA2-enterprise vendor implementation weaknessesthrough challenge response oracles, July 2014. There is a lot of information about hijacking internet connection. The mosttrivial case is unencrypted (open) wireless connection. But it is stillpossible if the network is protected with WPA/WPA2-Enteprise. Three days work was sufficient to modify the behaviour of MSCHAPv2 and a bitof PEAP methods in EAP state machine within hostap. In the end, proof-of-concept simulation demonstrates the attack flow. It is reasonable, since this code base is widely spread and up-to-date, what'seven more important. Hence, it is a very good sandbox for EAP attacks.