We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Simulation of MITM in PEAP with hostap

Formal Metadata

Title
Simulation of MITM in PEAP with hostap
Subtitle
application of EAP state machines from hostap for MITM simulation
Title of Series
Number of Parts
611
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language
Production Year2017

Content Metadata

Subject Area
Genre
Abstract
It's a talk about MITM in Tunneled Authentication Protocols and its consequentimplementation with a help of hostap project. The research is not original andyou may find a deeper overview in the paper: Pieter Robyns, Bram Bonné, PeterQuax, Wim Lamotte, Exploiting WPA2-enterprise vendor implementation weaknessesthrough challenge response oracles, July 2014. There is a lot of information about hijacking internet connection. The mosttrivial case is unencrypted (open) wireless connection. But it is stillpossible if the network is protected with WPA/WPA2-Enteprise. Three days work was sufficient to modify the behaviour of MSCHAPv2 and a bitof PEAP methods in EAP state machine within hostap. In the end, proof-of-concept simulation demonstrates the attack flow. It is reasonable, since this code base is widely spread and up-to-date, what'seven more important. Hence, it is a very good sandbox for EAP attacks.