Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3484569
|View full text |Cite
|
Sign up to set email alerts
|

All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…These attacks can be launched by anyone within range of the victim, and nowadays low-cost Wi-Fi "deauthers" are readily available for less than $10 [31]. Disconnecting a client from the network is an essential step towards successfully executing many attacks, in particular those targeting the connection process, with example attacks being [3,6,7,16,23,24,39]. For instance, offline dictionary attacks against the passphrase of a WPA2 network require the adversary to capture a client's 4-way handshake, and can be accelerated by capturing additional handshakes.…”
Section: Introductionmentioning
confidence: 99%
“…These attacks can be launched by anyone within range of the victim, and nowadays low-cost Wi-Fi "deauthers" are readily available for less than $10 [31]. Disconnecting a client from the network is an essential step towards successfully executing many attacks, in particular those targeting the connection process, with example attacks being [3,6,7,16,23,24,39]. For instance, offline dictionary attacks against the passphrase of a WPA2 network require the adversary to capture a client's 4-way handshake, and can be accelerated by capturing additional handshakes.…”
Section: Introductionmentioning
confidence: 99%
“…These flaws allowed an attacker to recover the password of the wireless network even if configured with WPA3. Furthermore, researchers analyzed the security of enterprise networks and identified several weaknesses [214,215], for example, widespread security issues due to evil twin attacks [216] and poor configurations [176,217]. Denial-of-service attacks against Wi-Fi networks are ubiquitous [218,219,220], have existed since the first version of the 4-way handshake [57,59], and even affect WPA3 [4,5].…”
Section: Related Workmentioning
confidence: 99%
“…These attacks can be launched by anyone within range of the victim, and nowadays low-cost Wi-Fi "deauthers" are readily available for less than $10 [171]. Disconnecting a client from the network is an essential step towards successfully executing many attacks, in particular those targeting the connection process, with example attacks being [172,167,173,18,174,175,176]. For instance, offline dictionary attacks against the passphrase of a WPA2 network require the adversary to capture a client's 4-way handshake, and can be accelerated by capturing additional handshakes.…”
Section: Introductionmentioning
confidence: 99%