NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - DragonBlood – New Vulnerability in WPA3 Protocol Let Hackers To Steal WiFi Password


4 Results - Page 1 of 1 -
1
Author Message
Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3733
Team:
Reputation: 10524 Reputation
Online
Fri, 19 Apr 2019 @ 18:36:58

"Researchers uncovered 2 different design flaw in WPA3 Protocol, and the both vulnerabilities can be abused by the attacker to steal the password in the targetted Wi-Fi network. "

1. Downgrade attacks
2. Side-channels leaks

DragonBlood – New Vulnerability in WPA3 Protocol Let Hackers To Steal WiFi Password

Dragonblood - Analysing WPA3's Dragonfly Handshake


XMPP: freeroute@xmpp.jp
General rules | Paid section rules

Avatar
0cyber

Status: Banned
Joined: Mon, 25 Feb 2019
Posts: 15
Team:
Reputation: 0 Reputation
Offline
Fri, 19 Apr 2019 @ 18:45:57

WARNING! User is BANNED and maybe a SCAMMER.

I read on Hashcat forum that this is all patched already?


Avatar
vtar

Status: Banned
Joined: Wed, 07 Mar 2018
Posts: 284
Team:
Reputation: 126 Reputation
Offline
Sun, 21 Apr 2019 @ 03:59:11

WARNING! User is BANNED and maybe a SCAMMER.

I am waiting for TKIP to be 100% broken

Right now the flaws of TKIP is not seriously broken


Avatar
bedis

Status: Banned
Joined: Wed, 17 Apr 2019
Posts: 17
Team:
Reputation: 0 Reputation
Offline
Sun, 21 Apr 2019 @ 05:28:54

WARNING! User is BANNED and maybe a SCAMMER.

does WPA3 prepone TKIP?



4 Results - Page 1 of 1 -
1

We have a total of 216234 messages in 26436 topics.
We have a total of 23311 registered users.
Our newest registered member is sch1z0.