|
|
WPA PSK attacks
Any PTK can be generated by learning the two MAC addresses,
nonces and selected ciphersuite during the initial exchange
Anyone with knowledge of the PSK can determine any PTK in the
ESS (Extended Service Set) through passive sniffing of the wireless
network
A key generated from a passphrase of less than about 20
characters is likely vulnerable to the dictionary attack
Since the single PSK is used for the whole ESS, the attacker
is now a member of the ESS, and the whole ESS is compromised
WPA PSK should use only truly random keys!!!
|