wifi-security Difference between WPA and WPA2 You will learn the differences between WPA and WPA2 encryption, including why hardware updates were necessary for WPA2, and the differences in the final MPDU of both encryptions.
wifi-security Robust Security Network and Extended Authentication Protocol in Detail Learn about the Robust Security Network, its features, and the use of the 802.11X Extended Authentication Protocol. Understand how the 4 way handshake generates dynamic keys for each network device.
wifi-security Pivoting Over Challenge Based Enterprise WiFi Network You will discover how to connect to the organization's access point using PEAP-MSCHAPv2 authentication and relay the response to the authenticator challenge This will allow you to read the private emails on a LAN-hosted POP3 server.
wifi-security Pivoting Over TTLS-PAP WPA Enterprise Networks In this post, you will learn how to obtain wifi credentials for a TTLS-PAP enterprise network, connect to the network, and access LAN resources.
wifi-security Crack WPA2-PSK from Probing Clients In this post, I'll show you how to set up a honey pot access point with hostapd and capture the EAPOL handshake from a probing client to brute force the pre-shared key.
wifi-security Crack Pre-Shared Key of WPA/WPA2 from Live Network In this post, you will learn how to capture the 2 out of 4 EAPOL handshakes of WPA network and crack the password from a wordlist.