Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 22 Sep 2019 09:50:47 -0400
From: Robert Moskowitz <>
To:, "M.Hamza Aziz" <>
Subject: Re: How to crack WPA2

On 9/22/19 2:47 AM, M.Hamza Aziz wrote:
> I'm a new bae. I want to crack WPA2 SECURITY. how is this possible.
First you need to intercept something to attack, and that is easy. See 
my 2003 paper on it.  It is archived in many places like:

WPA or WPA2 it makes no difference, sadly.    There are papers and tools 
to do the rainbow attacks.

Just dig a bit and you will find lots of ways to get the WPA2 password.

Now with WPA3, they went with a PAKE (Password Augmented Key Exchange) 
which adds the password into a Elliptic Curve Diffie-Hellman exchange.  
On the IETF CFRG list there is lots of debates about the security 
profile for WPA3, but it is quite good. PAKEs in general are zero-proof 
key exchanges that should not have any offline attack.

But with WPA2; lots of attacks.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.