Attacking WPA3 - New Vulnerabilities And Exploit Framework
Hack In The Box Security Conference via YouTube
Google, IBM & Microsoft Certificates — All in One Plan
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Dive into an in-depth analysis of WPA3's security features in this conference talk from the Hack In The Box Security Conference. Explore the new Simultaneous Authentication of Equals handshake, Management Frame Protection, and SAE Public Key protocol. Uncover several 0-day vulnerabilities, including attacks that allow adversaries to disconnect users, crash access points, and potentially intercept traffic. Learn about novel denial-of-service attacks that bypass WPA3 and MFP protections, affecting various operating systems. Discover design flaws in MFP and vulnerabilities in routers. Examine network-based attacks against the SAE-PK protocol. Gain insights into a new Wi-Fi testing framework that enables researchers to implement and test for these vulnerabilities. Benefit from the expertise of Mathy Vanhoef, a renowned professor and hacker known for discovering significant Wi-Fi security vulnerabilities and collaborating on industry-standard defenses.
Syllabus
#HITB2022SIN Attacking WPA3: New Vulnerabilities And Exploit Framework - Mathy Vanhoef
Taught by
Hack In The Box Security Conference