Hacking WPA3 with Mathy Vanhoef & Retia

Поділитися
Вставка
  • Опубліковано 2 жов 2024
  • WPA3 is the next generation of Wi-Fi security but that doesn't mean it's perfect. Find out how it works, and how it's already been hacked!
    Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
    ____________________________________________
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    Our Site → www.hak5.org
    Shop → www.hakshop.com
    Subscribe → www.youtube.co...
    Support → / threatwire
    Contact Us → / hak5
    Threat Wire RSS → shannonmorse.p...
    Threat Wire iTunes → itunes.apple.c...
    Host: Kody → / kodykinzie
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    ____________________________________________
    Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.

КОМЕНТАРІ • 127

  • @MrKristian252
    @MrKristian252 3 роки тому +54

    Woah, Kody from Nullbyte is here!!
    Nice to see a familiar face on the show

    • @JohnDoe-wi7eb
      @JohnDoe-wi7eb 3 роки тому +3

      Must be a old video kody has long hair now

    • @harshilshah980
      @harshilshah980 3 роки тому +2

      He makes regular appearances here...

    • @ankit168
      @ankit168 3 роки тому

      But I believe same WPA2 cracking tools don't work for WPA3 and Dos we can see it is happening but since Deauth is not there so cracking is possible ?? Or Just Brute force based on timing attack ?

  • @ghosttech9921
    @ghosttech9921 3 роки тому +11

    Tip 1 - never join any open network.

    • @a21123
      @a21123 6 місяців тому

      can someone deauth me if i use macchanger?

  • @user-md1jg6vj1r
    @user-md1jg6vj1r 3 роки тому +28

    Yes! this is what I like. Technical details

    • @subliminal9535
      @subliminal9535 3 роки тому

      THE SAME PERSON THAT WROTE 5HE ENCRYPTION CAN UNWRITE IT the problem is the trust of humans everybody has a price

  • @mizdebsk
    @mizdebsk 2 роки тому +7

    every time someone floods my router with DOS I triangulate their signal with 2 drones flying around and at the end I send my dogs after them.

    • @daddyelon4577
      @daddyelon4577 10 місяців тому

      How do you operate two drones at once?

    • @antiimperialista
      @antiimperialista 6 місяців тому

      @@daddyelon4577 with four hands

    • @50crowley
      @50crowley 4 місяці тому

      @@daddyelon4577 They control one and the dog controls the other.

  • @sontodosnarcos
    @sontodosnarcos Рік тому +5

    While it is possible to use brute force on WPA3, using a 24-digit password consisting of lower und uppercase letters, numbers and special characters should still make it virtually impossible for hackers to crack your password.

  • @chipko
    @chipko 3 роки тому +29

    Yey! Kody! Are you part of the hak5 team now?!

  • @tomf00lery
    @tomf00lery 3 роки тому +14

    Great stuff, love this format. 👍

  • @pewcfpv8056
    @pewcfpv8056 3 роки тому +6

    Woah! Congrats to being a part of Hak5! That's huge!

  • @philipm1896
    @philipm1896 3 роки тому +4

    This can't be Kody.
    I seen him blink 😉

  • @funguy4290
    @funguy4290 2 роки тому +5

    It's easier and harder than it's ever been. Keep making stuff.

  • @An.Individual
    @An.Individual 7 місяців тому +1

    I'm not convinced he has found a vulnerability worth worrying about

    • @mikeharborson1901
      @mikeharborson1901 7 місяців тому

      Nope... the reason the video only talks of wpa3 for the very last 10% of the video.......... GRR!!!!!

  • @juliettaylorswift
    @juliettaylorswift 3 роки тому +4

    so shocking seeing blackhat footage with all the people and maskless, i know 2019 footage and was before it all went down. Really miss defcon...still waiting on more details about this year tho.

    • @juliettaylorswift
      @juliettaylorswift 3 роки тому

      @Sec Codercould have phrased better-that footage was from 2019 (on some of the signage). Before it went down as in before covid/pandemic. Black hat is happening this year in person, and I have no idea if it did it not last year as I don't attend black hat. Defcon is happening this year in some form of part online part in person, but details are still limited.

  • @themtg5151
    @themtg5151 3 роки тому +4

    When did you start making videos for hak5🤣

  • @kristoffseisler2163
    @kristoffseisler2163 3 роки тому +4

    where can you even get a wpa3 router? i have ddwrt but but it seems its bugged and it never worked for me. but does wpa3 exist for modern routers nowadays?

    • @Bierkameel
      @Bierkameel 3 роки тому +2

      Router? My Aruba Instant On Accesspoints support WPA3.

    • @user-md1jg6vj1r
      @user-md1jg6vj1r 3 роки тому

      AVM routers

    • @kristoffseisler2163
      @kristoffseisler2163 3 роки тому +2

      @@logmeindog alright thats nice. yeah i know sucks about kong but still using ddwrt for those custom iptables firewall rules

    • @forgottenone1973
      @forgottenone1973 3 роки тому

      just installed openwrt on a xiaomi ac2100. can set wpa3 security too.

    • @wildyato3737
      @wildyato3737 3 роки тому +1

      @@logmeindog Hey does WPA3 2019 vulnerabilities has been patched yet?
      And what were you talking about downgrade attacks?isnit possible when using Mixed type of network?..or WPA3 is inherited from WPA2??

  • @serversC13nc3
    @serversC13nc3 3 роки тому +2

    Nice to see you never blink in hack5.

  • @mysterychemical
    @mysterychemical 3 роки тому +2

    4:58 You cannot freaking leak my router password that way.

    • @krollik8
      @krollik8 2 роки тому

      Тут специально показан бред. Потому что wifi ломается по другому.

  • @HousewerkRecords
    @HousewerkRecords Рік тому +1

    Great video with lots of info. To sum this up, there’s no real point using wp3 yet as it’s still vulnerable. Hard wire everything that needs a steady connection I guess.

  • @TheErraticTheory
    @TheErraticTheory 2 роки тому +3

    Why not just have a set wait to respond timeout? Instead of forcing the 40 iteration calculations. That way you don’t need to compute, just waiting to respond as if you did.

    • @f.3850
      @f.3850 Рік тому

      What do you mean

    • @Hadi-xr8ef
      @Hadi-xr8ef Місяць тому

      You can't , what if the password is too long and needs a lot of iterations? the response time might be more than what it's limited to therefore this is not applicable.

    • @Hadi-xr8ef
      @Hadi-xr8ef Місяць тому

      You can't , what if the password is too long and needs a lot of iterations? the response time might be more than what it's limited to therefore this is not applicable.

  • @cajay4825
    @cajay4825 3 роки тому +1

    Can i get the Link to white paper please to understand vulnerability even better.

  • @_unkn0wn._
    @_unkn0wn._ 3 роки тому +3

    Yes kody keep it going bro 😎

  • @kentharris7427
    @kentharris7427 5 місяців тому

    Easy Peasy. Simply create an evil twin Wi-Fi that has a higher signal strength then the original router, most of all PCs and Smart phones keep a Wi-Fi password list for a quick connection to the network. Personally haven't tried it, sounds feasible however.

  • @OftFilms
    @OftFilms 3 роки тому +7

    Nullbyte nice to see you here too

  • @katanasteel
    @katanasteel 3 роки тому +2

    wouldn't it just be better to do the minimal amount of iterations, and then just sleep the remaining time (so just specify the handshake to take say 250ms)?
    that way the multiple auths won't overload the routers as sleeping shouldn't take resources...

    • @henrycook859
      @henrycook859 2 роки тому +2

      Right?? Timing attacks are incredibly easy to patch, I'm sure they've thought about that but this video doesn't sufficiently explain why timing attacks "can't" be prevented.

    • @katanasteel
      @katanasteel 2 роки тому +1

      @@henrycook859 1 added bonus the AP will leak less information whether the auth was successful or not... when they always takes 250ms.

    • @krollik8
      @krollik8 2 роки тому

      Можно просто слушать эфир и перехватить рукоподатия. Все это полный бред.

  • @CallMeKRSNA
    @CallMeKRSNA Рік тому +1

    Hackers are like Hah this update is lol

  • @netoeli
    @netoeli 3 роки тому +2

    Hak5 bringing the hacking family together since 2005

    • @krollik8
      @krollik8 2 роки тому

      Тут полный бред. Так wifi не ломается.

  • @matthewpepperl
    @matthewpepperl 3 роки тому +2

    wpa2 seems fine just require 25 character passwords and a certain amount of entropy it already requires at least 8 chars anyway problem solved

    • @matldn2697
      @matldn2697 3 роки тому

      true, my password is 25 digit, totally non dictionary

    • @adinasa8668
      @adinasa8668 3 роки тому +2

      I Have 20 chars pass unique pass and they still hacked my device i dont know how in wpa2 ,they controled my car in Asphalt 9 on the Nintendo switch ,unbelivable

    • @matldn2697
      @matldn2697 3 роки тому +1

      @@adinasa8668 Probably you were infected with a key logger?

    • @krollik8
      @krollik8 2 роки тому

      Достаточно иметь хороший пароль. И ни кто не взломает.

  • @hellofriend3091
    @hellofriend3091 3 роки тому +2

    I just block the original network and make a clone of that network and capture the password with my cloned host..o think that will work

    • @francoisleveque145
      @francoisleveque145 3 роки тому

      Can’t block it in wpa3

    • @hellofriend3091
      @hellofriend3091 3 роки тому +1

      @@francoisleveque145 what about jamming?? With node mcu

    • @francoisleveque145
      @francoisleveque145 3 роки тому +2

      @Sec Coder if you do an evil twin and can’t deauth the first network there will be 2 access point with same essid

    • @hellofriend3091
      @hellofriend3091 3 роки тому

      @Sec Coder yes the concept is same im talking about doing it manually and you are about automation with wifite

    • @hellofriend3091
      @hellofriend3091 3 роки тому +1

      @Sec Coder i write my own tool it will work with high computing power, if wp3 is not blockable then its a security issues already,, think deeply

  • @doodmonkey
    @doodmonkey 3 роки тому +2

    Great stuff, thanks for the presentation.

  • @BlaMurda
    @BlaMurda 3 роки тому +1

    What's with the season and episode numbering? We skipped 29x02, then the thumbnail for this says 26x14? I try to keep an accurate backup of Hak5 (among others) in case the world ends is all...

    • @retiallc
      @retiallc 3 роки тому +1

      We uploaded this a longggggg time ago, with the pandemic we put production on hold for awhile.

    • @BlaMurda
      @BlaMurda 3 роки тому +1

      @@retiallc ah, was just curious. Thank you, also good video.

  • @vidhuchawla-indietrigg8000
    @vidhuchawla-indietrigg8000 Рік тому

    I have these protocals -
    - wep
    - wpa2
    - wpa2 mixed
    - wpa3
    - wpa2/wpa3 mixed
    Wich one is the best and strong?
    Plzz help!!

  • @jasonpitts8395
    @jasonpitts8395 3 роки тому +1

    I heard a rumor that the next gen Iphone will use a random MAC as a client, and use a diff MAC for the next AP, and so on.

    • @sethadkins546
      @sethadkins546 3 роки тому +4

      Most devices already have this capability.

    • @RedPill420
      @RedPill420 3 роки тому +2

      Android does this already

  • @xkorbekx
    @xkorbekx Рік тому

    3:22 My understanding is with perfect forward secrecy their not learning your “password” as its never exchanged via the handshake. They would capture the session key but that keys is temp. ?

  • @johanwennerberg1923
    @johanwennerberg1923 Рік тому

    Sorry for late comments.
    Would mac address allow, for my list, hinder this DDOS?

  • @Om-VasudeV-108
    @Om-VasudeV-108 2 роки тому

    should i buy macbook air with 8 gb ram and 256 gb of storage for network engineer and can you suggest for for this please

  • @raghavendra5698
    @raghavendra5698 Рік тому

    802.11w came before WPA3. de-auth for client and encrypting de-auth or disassociate is defined in 11w . But in wpa3 made compulsory to support. Where as made as optional. WPA3 defined protecting in more complex authentication process ( now 4 handshake ) before it was 2 way authentication handshake in wpa2

  • @BurkenProductions
    @BurkenProductions 2 роки тому

    It's pronounced "vpa-3" not double you we pee a three

  • @hb3643
    @hb3643 Рік тому

    Thx for the content. Do we have any tool that do these attacks. Any proof of concept?

  • @icanfixit1553
    @icanfixit1553 3 роки тому

    i guess only thing we can do is PHISH which has always been best way

  • @userou-ig1ze
    @userou-ig1ze 3 роки тому

    Oooohhh Darren... Smooorseee... ok I accept change... 'blink blink' thanks for the video and info

  • @chamodsachintha3095
    @chamodsachintha3095 3 роки тому +1

    Ohhh
    nullbyte in Hak5

  • @davidg4512
    @davidg4512 3 роки тому

    Why can't wifi work like TLS to change some keys, the operate normally?

  • @unknownanonymous4735
    @unknownanonymous4735 2 роки тому

    hi, very nice, but what does that iteration mean? 5:10

  • @HectorDiabolucus
    @HectorDiabolucus 3 роки тому

    Why don’t wireless devices just use SSL?

  • @DarinCates
    @DarinCates 3 роки тому +1

    WAIT WAIT ....... He is a man but talks like a little girl. Watch his mannerisms. That's a girl

    • @RedPill420
      @RedPill420 3 роки тому +2

      You paying attention to another man's mannerisms when the video is about WPA3 sounds sus to me

  • @jimgrayson4828
    @jimgrayson4828 Рік тому

    What about capturing the hand shake

  • @krollik8
    @krollik8 2 роки тому

    Полный бред. Ни кто не подбирает пароль к самому роутеру.

  • @TechTutorialsDavidMcKone
    @TechTutorialsDavidMcKone 3 роки тому

    Good to know. Thanks for sharing

  • @pi1392
    @pi1392 3 роки тому

    is that Vegas talk Pre Corona?

  • @hcr1
    @hcr1 3 роки тому

    Hi
    Does a device that support wpa2 could connect to wpa3 access point without updating the firmware in the client side?

    • @yumri4
      @yumri4 3 роки тому +1

      From what i can gather both of them have to support the same standard. So for a device only with WPA2 the access point would also have to support WPA2 for the device to be able to connect. For WPA3 i do suggest waiting for the finalized version of it before you go update your firmware to support it. To many changes made right now to say that it would be a good idea to do so as it might become incompatible with the released version of WPA3.

  • @upup5133
    @upup5133 3 роки тому

    0:30 is it hacked twice or 3 times? LOL

  • @omkhard1833
    @omkhard1833 3 роки тому

    nullByte being God Every time ...... even with HAK5

    • @omkhard1833
      @omkhard1833 3 роки тому

      Black Hat Seagale are godplace

  • @mallubot7074
    @mallubot7074 3 роки тому

    is this reuploaded

  • @mattymooo100
    @mattymooo100 3 роки тому

    Nullbyte is awesome!!!

  • @InfiniteQuest86
    @InfiniteQuest86 3 роки тому +2

    I'm confused. Why do a bunch of nonsense work that could mess with lightweight devices rather than just wait a fixed amount of time to respond? If the response takes longer, it could still leak some info, but much less than before.

    • @krollik8
      @krollik8 2 роки тому

      Ломается это по другому.

  • @ArulKumarJAKj
    @ArulKumarJAKj 3 роки тому +1

    Hello !!! Can you reduce yours talking. Such boring ..... Give tips and commands to us ...it's fine👍and this vedio without talking is 2-3 min😂

  • @vladimirmuzik8648
    @vladimirmuzik8648 3 роки тому

    I was never this early.

  • @evengraintech1397
    @evengraintech1397 3 роки тому

    bro. Blink

  • @heysuvajit
    @heysuvajit 3 роки тому

    NullByte 😊

  • @timbrown805
    @timbrown805 Рік тому

    I just don't use Wi-Fi or Bluetooth anymore at all. Imo they are no longer to be trusted mic drop

    • @mikeharborson1901
      @mikeharborson1901 7 місяців тому

      for house lights/no-risk automation, no prob. For anything sensitive, wired is just better anyways for reliability and performance!!

  • @irukard
    @irukard 3 роки тому

    40 iterations? Lol... Why not random time delay?

  • @TechnicalHeavenSM
    @TechnicalHeavenSM 3 роки тому

    Tutorial?🙂🙂🙂

  • @StarkThure
    @StarkThure 3 роки тому

    Waiting for wpa4

  • @_unkn0wn._
    @_unkn0wn._ 3 роки тому +1

    HELLO IM FIRST

    • @sylae_music
      @sylae_music 3 роки тому +1

      lol nobody cares

    • @retiallc
      @retiallc 3 роки тому

      @@sylae_music Don't listen to him bro I care

    • @ArthurTugwell
      @ArthurTugwell 3 роки тому

      Correct - The first loser.

  • @obscenity
    @obscenity 3 роки тому

    oh no, this website leaked into the hak5 channel, at least this video is very unlike theirs, which is good

  • @HornyGrandma
    @HornyGrandma Рік тому

    What's at risk if one were to simply commit to whitelist every approved device to a network, besides the time and maintenance to make sure the list is up to date? would the connection be secure and then it'd fall upon the device that's connected to make sure it isn't comprimised?

    • @triggermike420
      @triggermike420 Рік тому +1

      MAC filtering uses this concept. The connection would be secure, but it also isn't terribly difficult to spoof whitelisted device IDs, actually providing a method of entry. A capture of network packets would reveal the MAC addresses of whitelisted devices, giving an attacker exactly what they need to breach your network.

  • @grandmakisses9973
    @grandmakisses9973 3 роки тому

    Null byte!?!?!?