18 Sep
2015
18 Sep
'15
16:53
On Fri, Sep 18, 2015 at 9:29 AM, Xen wrote:
Once you know the name of an SSID/ap you can pretend to be it and usually the mobile device will hand you over its password, so now you have the password to the router/ap. Then you can just offer each SSID in turn and take every password that is offered to you. There is no security in this, no verification at all.
With an rouge AP/evil-twin attack, the four way handshake prevents the AP from obtaining a plaintext pre-shared key. You would still need to brute force the handshake/message integrity check similar to a normal WPA2-PSK access point. Brandon Vincent -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org