Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless &Amp; Mobile Networks 2014
DOI: 10.1145/2627393.2627411
|View full text |Cite
|
Sign up to set email alerts
|

Short paper

Abstract: Many of today's enterprise-scale wireless networks are protected by the WPA2-Enterprise Protected Extensible Authentication Protocol (PEAP). In this paper it is demonstrated how an attacker can steal a user's credentials and gain unauthorized access to such networks, by utilizing a class of vulnerable devices as MSCHAPv2 challenge response oracles. More specifically this paper explains how on these devices, Lightweight EAP (LEAP) MSCHAPv1 credentials can be captured and converted to PEAP MSCHAPv2 credentials b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…These flaws allowed an attacker to recover the password of the wireless network even if configured with WPA3. Furthermore, researchers analyzed the security of enterprise networks and identified several weaknesses [214,215], for example, widespread security issues due to evil twin attacks [216] and poor configurations [176,217]. Denial-of-service attacks against Wi-Fi networks are ubiquitous [218,219,220], have existed since the first version of the 4-way handshake [57,59], and even affect WPA3 [4,5].…”
Section: Related Workmentioning
confidence: 99%
“…These flaws allowed an attacker to recover the password of the wireless network even if configured with WPA3. Furthermore, researchers analyzed the security of enterprise networks and identified several weaknesses [214,215], for example, widespread security issues due to evil twin attacks [216] and poor configurations [176,217]. Denial-of-service attacks against Wi-Fi networks are ubiquitous [218,219,220], have existed since the first version of the 4-way handshake [57,59], and even affect WPA3 [4,5].…”
Section: Related Workmentioning
confidence: 99%