2021
DOI: 10.1007/978-981-15-9019-1_29
|View full text |Cite
|
Sign up to set email alerts
|

Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…In WPA2, the PMK is primarily derived from the passphrase and the SSID, both of which are independent of the session. This strategy leads to the well-known dictionary attack [11], one of the most significant weak points of the WPA2-personal security framework. On the contrary, for WPA3, a per-session PMK is generated and mutually agreed upon by the two endpoints through the utilization of the Simultaneous Authentication of Equals (SAE) exchange.…”
Section: Framementioning
confidence: 99%
“…In WPA2, the PMK is primarily derived from the passphrase and the SSID, both of which are independent of the session. This strategy leads to the well-known dictionary attack [11], one of the most significant weak points of the WPA2-personal security framework. On the contrary, for WPA3, a per-session PMK is generated and mutually agreed upon by the two endpoints through the utilization of the Simultaneous Authentication of Equals (SAE) exchange.…”
Section: Framementioning
confidence: 99%