The same security researchers that disclosed the initial five WPA3 vulnerabilities (referred to as Dragonblood) earlier this year in April, have recently disclosed two additional WPA3 vulnerabilities. Just like the initial five Dragonblood vulnerabilities, these two new ones allow attackers to either downgrade or bypass WPA3 encryption protected networks via brute force … [Read more...]
Let’s Discuss: WPA2 Packet Captures
If you’ve never used Wireshark with promiscuous mode enabled, I highly recommend it – if you’re into geeky things that is. I know I am! This should go without saying, be responsible in what you do. Promiscuous mode allows a capable wireless network interface card (WNIC) to listen to all wireless traffic, regardless if the traffic is destined for your client machine or not. … [Read more...]