Attacking WPA3 networks

Dragonblood: Attacks on WPA3s Dragonfly Handshake

Introduction The Dragonblood vulnerability has revealed several significant weaknesses in WPA3, the latest Wi-Fi security protocol. WPA3 was designed to provide improved security over its predecessor, WPA2, by using a new handshake method called Dragonfly . However, research has uncovered flaws in both WPA3 and the EAP-pwd protocol, which also uses Dragonfly. Here’s an overview of the key attacks and vulnerabilities associated with these discoveries by Mathy Vanhoef . Key Attacks on WPA3 Downgrade & Dictionary Attack Against WPA3-Transition The WPA3 protocol includes a transition mode to support older WPA2 clients....

August 25, 2024 · 15 min
Relaying NTLM over services

Awesome Relay 0x00 : Understanding and using NTLM Relay - Techniques and Protection

Introduction During a penetration testing engagement, it is common to encounter an Active Directory environment that uses outdated protocols like LLMNR and to find workstations that accept unsigned packets. When both of these conditions are present, it is possible to spoof a domain user’s identity to connect to a specific service (LDAP, SMB, HTTP) and perform malicious actions on behalf of the impersonated user. In this series of articles, we will begin with a deep understanding of why it is possible to relay NTLM to compromise a user....

July 27, 2024 · 5 min