Hola, A really interested topic to read: Is WPA2 Security Broken Due to Defcon MS-CHAPv2 Cracking? Credit & Source: Revolution WiFi
Hello I read about the "Defcon MS-CHAPv2 Cracking" in google:snake & some body said: "It's true, MS-CHAPv2 cracked !", & that's private to 'cloudcracker.com' until now
Hello ALFA-550W, Frankly speaking? I think there is a priv8 exploit to all the COMPUTER WORLD, it just isn't the time to TRIGGER this, and TRIGGER that
Lets see what happens with the cloudcraker has any one tried it? Im having a hard time getting the handshake in the first place
It's simply just an old bruteforce attack in a cloud, but a tool called tkiptun-ng is under developement and act like a chopchop attack. It obtain the MIC (Message Integrity Check) in a small part of a packet. After the MICHAEL algorithm sent back the MIC key protected packets and it's being sent from the AP to the client. From now, tkiptun-ng just retreive the MIC key and knows a keystram for access point to client communication. We could use the XOR file to create new packets and inject them that could be done using aircrack-ng suite tools as for a wep key. On the way but.......NOT CRACKED read a lot the WPA chapter in Practical attacks against WEP and WPA written by Martin Beck and Erik Tews
this is indeed interesting !! Reaver able to crack WPS ! some routers don't have WPS feature... hopefully they will developed a tool like reaver to crack WPA2