WPA3 Hacked!

Описание к видео WPA3 Hacked!

This video covers all the flaws Mathy Vanhoef and Eyal Ronen discovered in WPA3 and the dragonfly handshake used in it.

Link to the full paper (Dragonblood: A Security Analysis of WPA3's SAE Handshake):
https://papers.mathyvanhoef.com/drago...

Tools to test whether a network is vulnerable or not:
Dragonslayer: https://github.com/vanhoefm/dragonslayer
Dragondrain: https://github.com/vanhoefm/dragondra...
Dragontime: https://github.com/vanhoefm/dragondra...
Dragonforce: https://github.com/vanhoefm/dragonforce
---------------------------------------------------------------
✳️ Subscribe and use this link to opt-in to the course giveaway 👇
https://forms.gle/987ViTu4tH6Ah3PcA
---------------------------------------------------------------
🧠 My hacking courses 👇
https://zsecurity.org/courses/
---------------------------------------------------------------
Website - https://zsecurity.org/
Facebook -   / zsecurity-1453250781458287  
Twitter -   / _zsecurity_  
Instagram -   / zsecurity_org  
Linkedin -   / zsecurity-org  
---------------------------------------------------------------
⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️

Комментарии

Информация по комментариям в разработке