FragAttacks: Demonstration of Flaws in WPA2/3

Поділитися
Вставка
  • Опубліковано 9 січ 2025

КОМЕНТАРІ • 61

  • @samykamkar
    @samykamkar 3 роки тому +33

    Awesome!

  • @harlanrosenthal8648
    @harlanrosenthal8648 3 роки тому +2

    It is painstaking analysis and attention to detail like this that helps make networking (and so much other technology) safe and convenient for the average user.

  • @bradfordltd
    @bradfordltd 3 роки тому +9

    Brilliant, amazing work Mathy!

  • @BenjaminEggerstedt
    @BenjaminEggerstedt 3 роки тому +11

    Great work, as always Mathy. Congratulations to you and the team around you! I now have a few questions for my R&D colleagues.

  • @iosdec
    @iosdec 3 роки тому +8

    Wow, nice work and very well explained.

  • @kalewill3149
    @kalewill3149 3 роки тому +6

    Great demon. You explained everything so well. Thank you

  • @fitnhungry
    @fitnhungry 3 роки тому +5

    Really great demo. Thank you!

  • @rogerbiderbost
    @rogerbiderbost 3 роки тому +1

    Espectacular!!! Excelente Trabajo!!

  • @iamk3jja
    @iamk3jja 3 роки тому +7

    Great demo! thanks!

  • @drygdryg2
    @drygdryg2 3 роки тому +3

    It's really interesting research. Thank you!

  • @Momfasa
    @Momfasa 3 роки тому +6

    Amazing. Good job!

  • @beqodia
    @beqodia 3 роки тому +6

    Good job man !

  • @En1minute
    @En1minute 3 роки тому

    Hello, je passais par là pour voir un peu les tuto existants et potentiellement me donner des idées, et franchement ta vidéo est plutôt cool :)
    Perso je me suis lancé le défi de faire un format court : des tutos en 1 minute ! C'est pas toujours facile ^^
    Bonne continuation, et merci pour la vidéo ! :)

  • @chileanexperiment
    @chileanexperiment 3 роки тому +1

    great work and presentation!

  • @guacfiend
    @guacfiend 3 роки тому +2

    very detailed explanation!

  • @Z3kyTw0
    @Z3kyTw0 3 роки тому +2

    Superb presentation bro.

  • @lucifermorningstar9332
    @lucifermorningstar9332 3 роки тому +7

    Man That Was Amazing! Also A request Could You tell us about malicious Dns and How to creat it? That would be Great!

    • @jozsefkovacs1435
      @jozsefkovacs1435 3 роки тому

      You can start a simple DNS server on your machine and set the IP address of attacked webpage to your machine. You can create a fraud webpage there and wait for the victim.
      The trick is in the changing of DNS server address by injected packets.

    • @justknot4481
      @justknot4481 3 роки тому +1

      it s a dns forwarder , or bridged 🤫

  • @kaleemullah247
    @kaleemullah247 3 роки тому +4

    Good work, now share the POC scripts so that we don't waste time on writing one ourselves.

  • @TheCramik
    @TheCramik 3 роки тому +1

    Can the DNS not just be set by the FakeAP without the injection just by using the whole DHCP process or whatever? FakeAP/Evil Twin attacks aren't particularly new, but the injection for stuff like Windows 7 attack is pretty cool

    • @vanhoefm
      @vanhoefm  3 роки тому +5

      The attacker isn't creating a traditional "rouge AP". The attacker is copying all frames from the real AP to a different Wi-Fi channel, and this is used to reliably block and modify encrypted frames. Technically it's called multi-channel MitM, see for more details papers.mathyvanhoef.com/wisec2018.pdf It's only possible to inject frames towards the victim by using the new design flaw.

  • @bestonyoutube
    @bestonyoutube 3 роки тому +1

    Would mitigations in access points reduce the throughput bandwidth performance of Wifi? Especially for Wifi6?

    • @vanhoefm
      @vanhoefm  3 роки тому +1

      The security updates won't reduce the throughput of your network. If you disable Wi-Fi 6 as a temporary mitigation that might of course reduce the throughput.

  • @timevortex9753
    @timevortex9753 3 роки тому +1

    This is brilliant thank you

  • @ImperialPizarro
    @ImperialPizarro 3 роки тому +1

    Mathy you are awesome

  • @sinancetinkaya
    @sinancetinkaya 3 роки тому

    Excellent Job 👍

  • @Itangalo
    @Itangalo 3 роки тому +1

    Holy crap. Thanks.

  • @KasuyaMofu
    @KasuyaMofu 3 роки тому

    awesome demo!

  • @Leftplayer1
    @Leftplayer1 3 роки тому +2

    So hold on, based on this video, the flaws aren’t in WiFi design but in:
    IPv6 insecure RA design
    Lack of security in IoT devices
    Bugs/design flaws in unpatched windows 7.
    … but obviously, WiFi is to blame.

    • @vanhoefm
      @vanhoefm  3 роки тому +3

      No, normally in a protected Wi-Fi network you cannot inject packets. This means none of these attacks, in the situation described in the video, are possible under normal circumstances. The discovered vulnerabilities allow you to (simply stated) "remove" Wi-Fi protection.
      See the website and paper for details: papers.mathyvanhoef.com/usenix2021.pdf

    • @Leftplayer1
      @Leftplayer1 3 роки тому +1

      @@vanhoefm true, and I understand you are simply using these as demos for the underlying flaws in WiFi, but these demos would also apply to wired networks. You could spoof a MAC and if it’s not protected at the switch you could easily trick the MAC bridging table and use the same exploits. So the root exploit in these demos is actually the lack of security on the upper layers.

    • @vanhoefm
      @vanhoefm  3 роки тому +5

      ​@@Leftplayer1 Wi-Fi security is supposed to prevent an outsider from getting internal access to your network. The demo shows that this isn't the case. The equivalent and better comparison is a wired network that uses port-based access control, in which case these demos wouldn't be possible.

  • @rsinistic
    @rsinistic 3 роки тому +3

    Too many variables. Knowing what site to clone and hoping it doesn't use SSL.
    Knowing who to send the email to and hoping they they don't use SPF, Dmarc and dkim. Also, eap - peap enabled WiFi would pose a problem. Good for home WiFi, corporate not so much. Otherwise, good POC 👍

    • @adrien3357
      @adrien3357 3 роки тому

      Well... you can still try a breach attack since you are mitm

  • @98f5
    @98f5 3 роки тому

    awesome work

  • @MrG-ed5ru
    @MrG-ed5ru 3 роки тому

    Thanks so much 👌🏼

  • @bestonyoutube
    @bestonyoutube 3 роки тому

    I still dont understand this. Why isnt this super important? I've read several times now, that this is kinda impossible to abuse. Why? I have several APs and devices which don't get updates anymore. Am I at risk if I use WPA2? Or do attackers need to be "inside my Wifi" and have the WPA2 key to attack?

    • @wildyato37
      @wildyato37 3 роки тому +1

      I am confused as you are....

    • @bestonyoutube
      @bestonyoutube 3 роки тому

      @@wildyato37 Yeah. All my APs still dont have an update for this and wont ever get one. I am not sure how risky it is or if Im safe.

    • @wildyato37
      @wildyato37 3 роки тому

      @@bestonyoutube I am also facing this thing,that you said before......also I am experiencing unwanted sudden kick out form my network.....So does my internal network got hacked?......
      Also facing Internet outrage

    • @ManeshThankappan
      @ManeshThankappan 3 роки тому

      Unless you update ur APs and WiFi devices against these new vulnerabilities, they are suseptable to different types of aggregation and fragmentation attacks mentioned. It's a widely affected implentation flaw in the 802.11 std. Unfortunately, many devices can't be patched especially iot

    • @ManeshThankappan
      @ManeshThankappan 3 роки тому

      And, to abuse these flaws, you must set up multi channel mitm setup.

  • @ManeshThankappan
    @ManeshThankappan 3 роки тому

    Awesome 👍

  • @SrIgort
    @SrIgort 3 роки тому +1

    Time to run to the mountains

  • @fpnet
    @fpnet Рік тому

    Great!

  • @christianmayr6889
    @christianmayr6889 3 роки тому +3

    And here I was thinking Windows 7 was safe ;)

    • @gagarinone
      @gagarinone Рік тому

      It is more safe, if you disable Windows Remote Desktop service.

  • @YB0602
    @YB0602 2 роки тому

    But I don’t get what’s so impressive about this? Windows 7 isn’t supported anymore that’s why it’s vulnerable for attacks

  • @devstecken9975
    @devstecken9975 3 роки тому

    parabéns

  • @sinistergeek
    @sinistergeek 3 роки тому

    interesting attack

  • @romanburczymorda4313
    @romanburczymorda4313 3 роки тому +1

    Edziu też mówi, że nie pije :D

  • @mnageh-bo1mm
    @mnageh-bo1mm 3 роки тому

    How da fuck does all this work without knowing the darn password howwwww ?????

  • @leonardoti
    @leonardoti 3 роки тому

    OMG

  • @johnnynickgers8171
    @johnnynickgers8171 3 роки тому +1

    Drop source code no balls

  • @wrastlinape
    @wrastlinape 3 роки тому

    Trying to use the test tool and run the main script
    ./fragattack.py wlan0 [--ap] ping
    I am getting
    Test name '[--ap]' not recognized. Specify a valid test case.
    as an error... is ap a placeholder for something else I need to be using?

  • @thelegendofhridoy4849
    @thelegendofhridoy4849 2 роки тому

    Mathy sir can you give me the code of nat_punch_tcpsyn.py

  • @szx2238
    @szx2238 3 роки тому +1

    Awesome Job!!!