Breaking

Important Notice

Thank You for visiting our website https://www.hackingcourses4free.tk/. We are hereby to inform that we are going to change the domain name of the website from hackingcourses4free.tk/ to kali4hacking.com after 10 days.So,if you are unable to visit our website. You may check the domain www.kali4hacking.com for our website.


Saturday, April 13, 2019

DRAGONBLOOD VULNERABILITY IN WPA3 WIFI SECURITY MAKES WPA3 WIFI SECURITY VULNERABLE


DRAGONBLOOD VULNERABILITY IN WPA3 WIFI SECURITY MAKES WPA3 WIFI SECURITY VULNERABLE
DRAGONBLOOD VULNERABILITY IN WPA3 WIFI SECURITY MAKES WPA3 WIFI SECURITY VULNERABLE
Dragonblood Vulnerability In WPA3 Wi-Fi Security Makes WPA3 Wi-Fi Security Vulnerable. This event of finding a vulnerability in the most secured wifi security level WPA3 named Dragonblood hints towards that there is nothing such as the most secure thing. WPA3 WiFi security was released just a couple of months back towards the end of 2018 and here we are today using the most secured or either vulnerable WiFi security level for our privacy and data protection.

ABOUT WPA3 WIFI SECURITY

WPA3 is the the latest version of WiFi security standard which was released by Wifi Alliance towards the end of 2018. Before the introduction of WPA3 WiFi security, people all over the world were using WPA2 WiFi security which was running for the past 14 years. This WPA2 Wifi security was found vulnerable as a result WPA3 wifi security was 98introduced.

FLAWS IN WPA3 WIFI SECURITY

FLAWS IN WPA3 WiFi SECURITY that was discovered were divided into two categories by the researcher.

The first category of the discovered vulnerability consisted of a series of downgraded attacks that could be used against WPA3-capable devices to check whether they are vulnerable using the known wifi hacking methods that are very much prevalent?
The second category, as said by the security researcher, consisted of a weakness in the Dragonfly handshake of WPA3. This Dragonfly handshake of WPA3 in the Wi-Fi standards by Wifi alliance can/is referred to as the Simultaneous Authentication of Equals (SAE) handshake. This Dragonfly handshake vulnerability method discovered the flaws in WPA3 wifi security.

ABOUT DRAGONBLOOD VULNERABILITY

The Dragonfly handshake forms the core of WPA3 wifi security. It is used in certain Wi-Fi networks which as common require a username as well as a password for connecting and using the Wifi.

The dragonfly connection method is also used in the EAP-PWD protocol. However, the flaw which was found against WPA3 also worked perfectly well against EAP-PWD connections, making it possible for getting hacked by any hacker. Hackers using the Dragonblood vulnerability can even recover a user's password when EAP-PWD security measure is used. The security researcher also discovered a series of serious bugs in most products that used EAP-PWD security connection measure. This can allow any person to thereby access the Wi-Fi network easily even without knowing the user's password for the wifi network.

Although EAP-PWD is used very less in number, still, this vulnerability is a serious threat for users using WPA3 security as well as EPA-PWD security connections which illustrates the risks as well as threats of incorrect implementation of Dragonfly.

LIST OF FLAWS IN WPA3 WIFI SECURITY

Below is the List of Flaws in WPA3 Wifi Security :

CERT ID #VU871675: A type of downgraded attack against WPA3 routers,

CERT ID #VU871675: A type of downgraded attack against WPA3 Dragonfly handshakes.

CVE-2019-9494: A timing-based attack against WPA3 handshake capturing.

CVE-2019-9494: Cache based internal attack on WPA3 routers using Dragonfly handshake.

CERT ID #VU871675: A type of Denial Of Service attack against WPA3 Dragonfly handshake.

The vulnerabilities mentioned above are very efficient and very cheap. For high-level descriptions of these attacks, and for the full technical details Kali4Hacking suggests to refer to the research papers(l, ink given at the end of the article) of the DRAGONBLOOD VULNERABILITY IN WPA3 WIFI SECURITY paper.

POTENTIAL OF THE DRAGONBLOOD VULNERABILITY

POTENTIAL OF THE DRAGONBLOOD VULNERABILITY is that it can be used to recover password of any Wi-Fi network. Also, the DRAGONBLOOD VULNERABILITY has the potential to launch resource consumption attacks, and can also force other devices to use weaker security for their protection. The WPA3 based Dragonblood attacks are against home networks (WPA3 Personal), In this case, one the password is only shared amongst all the users.

TOOLS RELEASED FOR DRAGONBLOOD VULNERABILITY

The security researchers have made scripts to test for certain vulnerabilities regarding DRAGONBLOOD VULNERABILITY:

DragonSlayer : DragonSlayer script implements attacks against EAP-PWD security connections.

DragonDrain : DragonDrain tool is used to test the limit that, up to which extent any access point is vulnerable to DOS or DDOS attack which can be used against WPA3 Simultaneous Authentication of Equals handshake.

DragonTime : DragonTime is an an experimental tool which is used to perform timing attacks against the Simultaneous Authentication of Equals handshake.

DragonForce : DragonForce is also an experimental tool which gathers information by recovering the data from our timing or cache-based attacks. Also, this tool can perform password related an attack such as a dictionary or brute-force attack.

Note: All the download and important links are given just at the end of the article.

OTHER IMPORTANT LINKS

Researchers Website: https://wpa3.mathyvanhoef.com


Dragonblood Tools








No comments:

Post a Comment