YoVDO

Weaknesses in WPA3's Dragonfly Handshake

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Network Security Courses Side Channel Attacks Courses Wi-Fi Security Courses

Course Description

Overview

Explore the vulnerabilities in WPA3's Dragonfly handshake and their practical implications in this comprehensive conference talk. Delve into the discovered attacks, including password partitioning attacks that exploit timing and cache-based side-channel leaks. Understand the efficiency and low cost of these attacks, with examples of brute-forcing 8-character lowercase passwords using Amazon EC2 instances. Examine backwards-compatible countermeasures and discuss why WPA3 may not meet modern security protocol standards, especially on devices with lightweight processors. Learn about the Dragonfly handshake, mod P groups, elliptic curves, and WPA3 hashing. Investigate invalid curve attacks, denial of service, and downgrade attacks. Evaluate the effectiveness of proposed solutions, WiFi standard updates, and the removal of timing leaks. Gain insights into the future of WPA3 and draw conclusions about its security implications for Wi-Fi networks.

Syllabus

Introduction
Dragonfly Handshake
How it works
What is a mod P group
A dictionary of passwords
Main takeaway message
Test setup
Eelliptic curves
WPA3 hashing
WPA3 countermeasure
Brainpool curves
If condition
Conclusion
Solution
Takeaway
Password Dictionary
Cost
Summary
Dragonfly implementations
Invalid curve attack
Curve check
Curve check as adversary
Guessing the key
EP PWD
Free Radius
Denial of Service
Downgrade Attacks
Downgrade Attack 2
S10 Patch
WiFi Standard Update
No More Timing Leaks
Possible Downgrade Attacks
Should You Use WPA3
Conclusions


Taught by

BruCON Security Conference

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity