
#WPA2 HASH TYPE PASSWORD#
The attacker therefore needs to guess the password that corresponds to the captured PTK. The PTK alone, however, is not enough to connect to a WPA network, as it is unique to each connection. The attacker will then capture the four exchanges and obtain the PTK. The PMK is then passed on to the PTK, and is based on new information/elements.Īs things stand, an attacker can force a client (if one is connected to the WPA network being attacked) to perform an additional authentication task.The key is passed to the PMK (Pairwise-Master-Key) and depends on the SSID (the name of the Wi-Fi network).This allows the client to transmit a PTK key to the server.īut to understand this, we also need to understand what a PTK key is and how it is linked to passwords.įigure 2 - Calculation of PTK (Pairwise-Transient-Key) from password In this exchange several data are exchanged. The below diagram depicts an EAPOL exchange, with the client on the left and the access point on the right: In short, the attack involves capturing a complete EAPOL (Extensible Authentication Protocol) exchange to recompose the PTK (Pairwise-Transient-Key), which can then be used for comparison to a password list. To understand the new attack identified by hashcat, we will dive deeper into the attack it is most similar to – the dictionary attack. Finally, the dictionary attack – the most common attack that applies to all WPA/WPA2 networks, where brute force methods are used to systematically try and break into a password protected network.Attacks based on intercepting wireless traffic and those allowing the arbitrary injection of packets.Attacks using WPS, or Wi-Fi Protected Setup ( ), where a PIN is guessed, or a default PIN is tried, in an attempt to retrieve the PSK and connect to an access point.The recent KRACK vulnerability, which is based on an implementation flaw.Several access point attacks using WPA already exist: Overview of existing WPA/WPA2 network attacks However, if your password is strong enough (15 characters or more and containing different types of characters), you don’t need to worry about this new WPA attack. With this new attack, the brute force method no longer requires any kind of interaction, increasing the number of access points exposed to this attack. In short, this attack differs from previous attacks because in those it was necessary to have a complete EAPoL exhchange, where authentification details from an actual user needed to be captured.



This new attack is based on the same principles of previous major attacks – a brute force attack to guess the password. For enterprise networks (based on 802.1x), other attacks do exist, but they will not be covered in this article. This also only applies to access points using a “Pre-Shared-Key” (the password you enter to connect to your Wi-Fi network, for example). The attacks we’re talking about are those targeting access points that have WPA/WPA2 security protocols ( ), which are used by the majority of access points.
