WPA3 dead on arrival with the Dragonbool

wpa3.mathyvanhoef.com/

> Unfortunately, our attacks against WPA3 also work against EAP-pwd, meaning an adversary can even recover a user's password when EAP-pwd is used. We also discovered serious bugs in most products that implement EAP-pwd. These allow an adversary to impersonate any user, and thereby access the Wi-Fi network, without knowing the user's password.


> Due to the severity of some of our (implementation-specific) attacks against EAP-pwd, we will briefly delay the release of the full details of the vulnerabilities that we discovered. Please use this short time window to update your devices, we plan to provide the full details in as little as a few hours.

Attached: logo.png (900x979, 60K)

Other urls found in this thread:

wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-security-enhancements
wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security
twitter.com/SFWRedditGifs

Nice

I don't get it. Everything is super easily spoofed/hacked. You have to design your shit from the PCB up with proprietary everything to ensure any remote possibility of security.

welp

WPA2 is not easy lol

super nice.
I havent paid for internet in 4 years.

imagine pushing a cryptographic protocol for standardization without proper public peer review process

just use randomly generated 35 character password for your WPA2
hackers on suicide watch

Attached: 0060 - zsXdU0O.png (255x255, 65K)

WPA2 doesn't fucking matter in normie space because WPS is fucking broken so you just sidestep WPA2 and pwn the router by brute forcing the pin with reaver.

Takes like five minutes and a $50 antenna that injects.

I bet your WPS is wide open for reaver pin cracking

>not using pfSense
>not configuring your own goddamn router you built from parts