Hacking WPA3 with Mathy Vanhoef & Retia

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 เม.ย. 2021
  • WPA3 is the next generation of Wi-Fi security but that doesn't mean it's perfect. Find out how it works, and how it's already been hacked!
    Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
    ____________________________________________
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    Our Site → www.hak5.org
    Shop → www.hakshop.com
    Subscribe → th-cam.com/users/Hak5Darr...
    Support → / threatwire
    Contact Us → / hak5
    Threat Wire RSS → shannonmorse.podbean.com/feed/
    Threat Wire iTunes → itunes.apple.com/us/podcast/t...
    Host: Kody → / kodykinzie
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    ____________________________________________
    Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 125

  • @MrKristian252
    @MrKristian252 3 ปีที่แล้ว +52

    Woah, Kody from Nullbyte is here!!
    Nice to see a familiar face on the show

    • @JohnDoe-wi7eb
      @JohnDoe-wi7eb 3 ปีที่แล้ว +3

      Must be a old video kody has long hair now

    • @harshilshah980
      @harshilshah980 3 ปีที่แล้ว +2

      He makes regular appearances here...

    • @ankit168
      @ankit168 3 ปีที่แล้ว

      But I believe same WPA2 cracking tools don't work for WPA3 and Dos we can see it is happening but since Deauth is not there so cracking is possible ?? Or Just Brute force based on timing attack ?

  • @pewcfpv8056
    @pewcfpv8056 3 ปีที่แล้ว +5

    Woah! Congrats to being a part of Hak5! That's huge!

  • @tomf00lery
    @tomf00lery 3 ปีที่แล้ว +14

    Great stuff, love this format. 👍

  • @serversC13nc3
    @serversC13nc3 3 ปีที่แล้ว +2

    Nice to see you never blink in hack5.

  • @funguy4290
    @funguy4290 2 ปีที่แล้ว +4

    It's easier and harder than it's ever been. Keep making stuff.

  • @doodmonkey
    @doodmonkey 3 ปีที่แล้ว +2

    Great stuff, thanks for the presentation.

  • @user-md1jg6vj1r
    @user-md1jg6vj1r 3 ปีที่แล้ว +27

    Yes! this is what I like. Technical details

    • @subliminal9535
      @subliminal9535 3 ปีที่แล้ว

      THE SAME PERSON THAT WROTE 5HE ENCRYPTION CAN UNWRITE IT the problem is the trust of humans everybody has a price

  • @TechTutorialsDavidMcKone
    @TechTutorialsDavidMcKone 3 ปีที่แล้ว

    Good to know. Thanks for sharing

  • @netoeli
    @netoeli 3 ปีที่แล้ว +2

    Hak5 bringing the hacking family together since 2005

    • @chertopoloh170
      @chertopoloh170 2 ปีที่แล้ว

      Тут полный бред. Так wifi не ломается.

  • @mizdebsk
    @mizdebsk ปีที่แล้ว +7

    every time someone floods my router with DOS I triangulate their signal with 2 drones flying around and at the end I send my dogs after them.

    • @daddyelon4577
      @daddyelon4577 6 หลายเดือนก่อน

      How do you operate two drones at once?

    • @antiimperialista
      @antiimperialista 2 หลายเดือนก่อน

      @@daddyelon4577 with four hands

    • @50crowley
      @50crowley หลายเดือนก่อน

      @@daddyelon4577 They control one and the dog controls the other.

  • @HousewerkRecords
    @HousewerkRecords ปีที่แล้ว

    Great video with lots of info. To sum this up, there’s no real point using wp3 yet as it’s still vulnerable. Hard wire everything that needs a steady connection I guess.

  • @chipko
    @chipko 3 ปีที่แล้ว +29

    Yey! Kody! Are you part of the hak5 team now?!

    • @ricseeds4835
      @ricseeds4835 3 ปีที่แล้ว

      This isn't his first appearance

    • @TheRealKitWalker
      @TheRealKitWalker 3 ปีที่แล้ว +1

      Yes, he joined hak5 😏

  • @_unkn0wn._
    @_unkn0wn._ 3 ปีที่แล้ว +3

    Yes kody keep it going bro 😎

  • @ghosttech9921
    @ghosttech9921 3 ปีที่แล้ว +8

    Tip 1 - never join any open network.

    • @a21123
      @a21123 2 หลายเดือนก่อน

      can someone deauth me if i use macchanger?

  • @hb3643
    @hb3643 ปีที่แล้ว

    Thx for the content. Do we have any tool that do these attacks. Any proof of concept?

  • @raghavendra5698
    @raghavendra5698 ปีที่แล้ว

    802.11w came before WPA3. de-auth for client and encrypting de-auth or disassociate is defined in 11w . But in wpa3 made compulsory to support. Where as made as optional. WPA3 defined protecting in more complex authentication process ( now 4 handshake ) before it was 2 way authentication handshake in wpa2

  • @pi1392
    @pi1392 3 ปีที่แล้ว

    is that Vegas talk Pre Corona?

  • @userou-ig1ze
    @userou-ig1ze 3 ปีที่แล้ว

    Oooohhh Darren... Smooorseee... ok I accept change... 'blink blink' thanks for the video and info

  • @sontodosnarcos
    @sontodosnarcos ปีที่แล้ว +4

    While it is possible to use brute force on WPA3, using a 24-digit password consisting of lower und uppercase letters, numbers and special characters should still make it virtually impossible for hackers to crack your password.

  • @OftFilms
    @OftFilms 3 ปีที่แล้ว +7

    Nullbyte nice to see you here too

  • @cajay4825
    @cajay4825 3 ปีที่แล้ว +1

    Can i get the Link to white paper please to understand vulnerability even better.

  • @An.Individual
    @An.Individual 4 หลายเดือนก่อน +1

    I'm not convinced he has found a vulnerability worth worrying about

    • @mikeharborson1901
      @mikeharborson1901 4 หลายเดือนก่อน

      Nope... the reason the video only talks of wpa3 for the very last 10% of the video.......... GRR!!!!!

  • @unknownanonymous4735
    @unknownanonymous4735 2 ปีที่แล้ว

    hi, very nice, but what does that iteration mean? 5:10

  • @khari83637
    @khari83637 ปีที่แล้ว

    3:22 My understanding is with perfect forward secrecy their not learning your “password” as its never exchanged via the handshake. They would capture the session key but that keys is temp. ?

  • @FunMaxClub
    @FunMaxClub 2 ปีที่แล้ว

    should i buy macbook air with 8 gb ram and 256 gb of storage for network engineer and can you suggest for for this please

  • @johanwennerberg1923
    @johanwennerberg1923 ปีที่แล้ว

    Sorry for late comments.
    Would mac address allow, for my list, hinder this DDOS?

  • @juliettaylorswift
    @juliettaylorswift 3 ปีที่แล้ว +4

    so shocking seeing blackhat footage with all the people and maskless, i know 2019 footage and was before it all went down. Really miss defcon...still waiting on more details about this year tho.

    • @juliettaylorswift
      @juliettaylorswift 3 ปีที่แล้ว

      @Sec Codercould have phrased better-that footage was from 2019 (on some of the signage). Before it went down as in before covid/pandemic. Black hat is happening this year in person, and I have no idea if it did it not last year as I don't attend black hat. Defcon is happening this year in some form of part online part in person, but details are still limited.

  • @philipm1896
    @philipm1896 3 ปีที่แล้ว +4

    This can't be Kody.
    I seen him blink 😉

  • @chamodsachintha3095
    @chamodsachintha3095 3 ปีที่แล้ว +1

    Ohhh
    nullbyte in Hak5

  • @davidg4512
    @davidg4512 3 ปีที่แล้ว

    Why can't wifi work like TLS to change some keys, the operate normally?

  • @mysterychemical
    @mysterychemical 2 ปีที่แล้ว +3

    4:58 You cannot freaking leak my router password that way.

    • @chertopoloh170
      @chertopoloh170 2 ปีที่แล้ว

      Тут специально показан бред. Потому что wifi ломается по другому.

  • @mattymooo100
    @mattymooo100 3 ปีที่แล้ว

    Nullbyte is awesome!!!

  • @omkhard1833
    @omkhard1833 3 ปีที่แล้ว

    nullByte being God Every time ...... even with HAK5

    • @omkhard1833
      @omkhard1833 3 ปีที่แล้ว

      Black Hat Seagale are godplace

  • @jasonpitts8395
    @jasonpitts8395 3 ปีที่แล้ว +1

    I heard a rumor that the next gen Iphone will use a random MAC as a client, and use a diff MAC for the next AP, and so on.

    • @sethadkins546
      @sethadkins546 2 ปีที่แล้ว +4

      Most devices already have this capability.

    • @RedPill420
      @RedPill420 2 ปีที่แล้ว +2

      Android does this already

  • @TheErraticTheory
    @TheErraticTheory 2 ปีที่แล้ว +3

    Why not just have a set wait to respond timeout? Instead of forcing the 40 iteration calculations. That way you don’t need to compute, just waiting to respond as if you did.

    • @f.3850
      @f.3850 ปีที่แล้ว

      What do you mean

  • @themtg5151
    @themtg5151 3 ปีที่แล้ว +4

    When did you start making videos for hak5🤣

  • @kristoffseisler2163
    @kristoffseisler2163 3 ปีที่แล้ว +4

    where can you even get a wpa3 router? i have ddwrt but but it seems its bugged and it never worked for me. but does wpa3 exist for modern routers nowadays?

    • @Bierkameel
      @Bierkameel 3 ปีที่แล้ว +2

      Router? My Aruba Instant On Accesspoints support WPA3.

    • @user-md1jg6vj1r
      @user-md1jg6vj1r 3 ปีที่แล้ว

      AVM routers

    • @kristoffseisler2163
      @kristoffseisler2163 3 ปีที่แล้ว +2

      @@logmeindog alright thats nice. yeah i know sucks about kong but still using ddwrt for those custom iptables firewall rules

    • @forgottenone1973
      @forgottenone1973 3 ปีที่แล้ว

      just installed openwrt on a xiaomi ac2100. can set wpa3 security too.

    • @wildyato3737
      @wildyato3737 2 ปีที่แล้ว +1

      @@logmeindog Hey does WPA3 2019 vulnerabilities has been patched yet?
      And what were you talking about downgrade attacks?isnit possible when using Mixed type of network?..or WPA3 is inherited from WPA2??

  • @BlaMurda
    @BlaMurda 3 ปีที่แล้ว +1

    What's with the season and episode numbering? We skipped 29x02, then the thumbnail for this says 26x14? I try to keep an accurate backup of Hak5 (among others) in case the world ends is all...

    • @retiallc
      @retiallc 3 ปีที่แล้ว +1

      We uploaded this a longggggg time ago, with the pandemic we put production on hold for awhile.

    • @BlaMurda
      @BlaMurda 3 ปีที่แล้ว +1

      @@retiallc ah, was just curious. Thank you, also good video.

  • @vidhuchawla-indietrigg8000
    @vidhuchawla-indietrigg8000 ปีที่แล้ว

    I have these protocals -
    - wep
    - wpa2
    - wpa2 mixed
    - wpa3
    - wpa2/wpa3 mixed
    Wich one is the best and strong?
    Plzz help!!

  • @kentharris7427
    @kentharris7427 หลายเดือนก่อน

    Easy Peasy. Simply create an evil twin Wi-Fi that has a higher signal strength then the original router, most of all PCs and Smart phones keep a Wi-Fi password list for a quick connection to the network. Personally haven't tried it, sounds feasible however.

  • @katanasteel
    @katanasteel 3 ปีที่แล้ว +2

    wouldn't it just be better to do the minimal amount of iterations, and then just sleep the remaining time (so just specify the handshake to take say 250ms)?
    that way the multiple auths won't overload the routers as sleeping shouldn't take resources...

    • @henrycook859
      @henrycook859 2 ปีที่แล้ว +2

      Right?? Timing attacks are incredibly easy to patch, I'm sure they've thought about that but this video doesn't sufficiently explain why timing attacks "can't" be prevented.

    • @katanasteel
      @katanasteel 2 ปีที่แล้ว +1

      @@henrycook859 1 added bonus the AP will leak less information whether the auth was successful or not... when they always takes 250ms.

    • @chertopoloh170
      @chertopoloh170 2 ปีที่แล้ว

      Можно просто слушать эфир и перехватить рукоподатия. Все это полный бред.

  • @icanfixit1553
    @icanfixit1553 3 ปีที่แล้ว

    i guess only thing we can do is PHISH which has always been best way

  • @mallubot7074
    @mallubot7074 3 ปีที่แล้ว

    is this reuploaded

  • @jimgrayson4828
    @jimgrayson4828 ปีที่แล้ว

    What about capturing the hand shake

  • @hcr1
    @hcr1 3 ปีที่แล้ว

    Hi
    Does a device that support wpa2 could connect to wpa3 access point without updating the firmware in the client side?

    • @yumri4
      @yumri4 3 ปีที่แล้ว +1

      From what i can gather both of them have to support the same standard. So for a device only with WPA2 the access point would also have to support WPA2 for the device to be able to connect. For WPA3 i do suggest waiting for the finalized version of it before you go update your firmware to support it. To many changes made right now to say that it would be a good idea to do so as it might become incompatible with the released version of WPA3.

  • @SpectralAI
    @SpectralAI 3 ปีที่แล้ว

    Why don’t wireless devices just use SSL?

  • @vladimirmuzik8648
    @vladimirmuzik8648 3 ปีที่แล้ว

    I was never this early.

  • @StarkThure
    @StarkThure 3 ปีที่แล้ว

    Waiting for wpa4

    • @wildyato3737
      @wildyato3737 2 ปีที่แล้ว

      For next 25 years🙏

  • @obscenity
    @obscenity 3 ปีที่แล้ว

    oh no, this website leaked into the hak5 channel, at least this video is very unlike theirs, which is good

  • @grandmakisses9973
    @grandmakisses9973 3 ปีที่แล้ว

    Null byte!?!?!?

  • @CallMeKRSNA
    @CallMeKRSNA ปีที่แล้ว +1

    Hackers are like Hah this update is lol

  • @matthewpepperl
    @matthewpepperl 3 ปีที่แล้ว +2

    wpa2 seems fine just require 25 character passwords and a certain amount of entropy it already requires at least 8 chars anyway problem solved

    • @matldn2697
      @matldn2697 3 ปีที่แล้ว

      true, my password is 25 digit, totally non dictionary

    • @adinasa8668
      @adinasa8668 3 ปีที่แล้ว +2

      I Have 20 chars pass unique pass and they still hacked my device i dont know how in wpa2 ,they controled my car in Asphalt 9 on the Nintendo switch ,unbelivable

    • @matldn2697
      @matldn2697 3 ปีที่แล้ว +1

      @@adinasa8668 Probably you were infected with a key logger?

    • @chertopoloh170
      @chertopoloh170 2 ปีที่แล้ว

      Достаточно иметь хороший пароль. И ни кто не взломает.

  • @hellofriend3091
    @hellofriend3091 3 ปีที่แล้ว +2

    I just block the original network and make a clone of that network and capture the password with my cloned host..o think that will work

    • @francoisleveque145
      @francoisleveque145 3 ปีที่แล้ว

      Can’t block it in wpa3

    • @hellofriend3091
      @hellofriend3091 3 ปีที่แล้ว +1

      @@francoisleveque145 what about jamming?? With node mcu

    • @francoisleveque145
      @francoisleveque145 3 ปีที่แล้ว +2

      @Sec Coder if you do an evil twin and can’t deauth the first network there will be 2 access point with same essid

    • @hellofriend3091
      @hellofriend3091 3 ปีที่แล้ว

      @Sec Coder yes the concept is same im talking about doing it manually and you are about automation with wifite

    • @hellofriend3091
      @hellofriend3091 3 ปีที่แล้ว +1

      @Sec Coder i write my own tool it will work with high computing power, if wp3 is not blockable then its a security issues already,, think deeply

  • @InfiniteQuest86
    @InfiniteQuest86 3 ปีที่แล้ว +2

    I'm confused. Why do a bunch of nonsense work that could mess with lightweight devices rather than just wait a fixed amount of time to respond? If the response takes longer, it could still leak some info, but much less than before.

    • @chertopoloh170
      @chertopoloh170 2 ปีที่แล้ว

      Ломается это по другому.

  • @heysuvajit
    @heysuvajit 3 ปีที่แล้ว

    NullByte 😊

  • @irukard
    @irukard 3 ปีที่แล้ว

    40 iterations? Lol... Why not random time delay?

  • @upup5133
    @upup5133 3 ปีที่แล้ว

    0:30 is it hacked twice or 3 times? LOL

  • @TechnicalHeavenSM
    @TechnicalHeavenSM 3 ปีที่แล้ว

    Tutorial?🙂🙂🙂

  • @timbrown805
    @timbrown805 ปีที่แล้ว

    I just don't use Wi-Fi or Bluetooth anymore at all. Imo they are no longer to be trusted mic drop

    • @mikeharborson1901
      @mikeharborson1901 4 หลายเดือนก่อน

      for house lights/no-risk automation, no prob. For anything sensitive, wired is just better anyways for reliability and performance!!

  • @evengraintech1397
    @evengraintech1397 2 ปีที่แล้ว

    bro. Blink

  • @chertopoloh170
    @chertopoloh170 2 ปีที่แล้ว

    Полный бред. Ни кто не подбирает пароль к самому роутеру.

  • @BurkenProductions
    @BurkenProductions 2 ปีที่แล้ว

    It's pronounced "vpa-3" not double you we pee a three

  • @_unkn0wn._
    @_unkn0wn._ 3 ปีที่แล้ว +1

    HELLO IM FIRST

    • @sylae_music
      @sylae_music 3 ปีที่แล้ว +1

      lol nobody cares

    • @retiallc
      @retiallc 3 ปีที่แล้ว

      @@sylae_music Don't listen to him bro I care

    • @ArthurTugwell
      @ArthurTugwell 3 ปีที่แล้ว

      Correct - The first loser.

  • @ArulKumarJAKj
    @ArulKumarJAKj 3 ปีที่แล้ว +1

    Hello !!! Can you reduce yours talking. Such boring ..... Give tips and commands to us ...it's fine👍and this vedio without talking is 2-3 min😂

  • @DarinCates
    @DarinCates 3 ปีที่แล้ว +1

    WAIT WAIT ....... He is a man but talks like a little girl. Watch his mannerisms. That's a girl

    • @RedPill420
      @RedPill420 2 ปีที่แล้ว +2

      You paying attention to another man's mannerisms when the video is about WPA3 sounds sus to me

  • @HornyGrandma
    @HornyGrandma ปีที่แล้ว

    What's at risk if one were to simply commit to whitelist every approved device to a network, besides the time and maintenance to make sure the list is up to date? would the connection be secure and then it'd fall upon the device that's connected to make sure it isn't comprimised?

    • @triggermike420
      @triggermike420 ปีที่แล้ว +1

      MAC filtering uses this concept. The connection would be secure, but it also isn't terribly difficult to spoof whitelisted device IDs, actually providing a method of entry. A capture of network packets would reveal the MAC addresses of whitelisted devices, giving an attacker exactly what they need to breach your network.