Penetration Testing mailing list archives
Re: WPA-PSK audit
From: Tim <tim-pentest () sentinelchicken org>
Date: Tue, 1 Jan 2008 10:16:17 -0500
Hello Josh,
Since the PSK is shared among all stations on the wireless network, every user with a workstation that has the PSK could conceivably know the PSK and share it with anyone else. Further, a stolen device could disclose the PSK for the network, compromising all later data exchanges.
And all earlier data exchanged, yes? My memory of the protocol is fuzzy, but WPA-PSK doesn't provide perfect forward secrecy, does it? thanks, tim ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------
Current thread:
- RE: WPA-PSK audit Matthews, Jeremiah W. (JSC-IT)[MEI] (Jan 03)
- <Possible follow-ups>
- Re: WPA-PSK audit Tim (Jan 03)
- Re: WPA-PSK audit pinowudi (Jan 03)
- RE: WPA-PSK audit Ng, Kenneth (US) (Jan 07)
- Re: WPA-PSK audit kevin horvath (Jan 08)
- Re[2]: WPA-PSK audit Matthew Leeds (Jan 10)
- Re: WPA-PSK audit Jon Uriona (Jan 14)
- Re[2]: WPA-PSK audit Matthew Leeds (Jan 10)