Critical vulnerability in the RADIUS protocol leaves networking equipment open to attack

A new critical security vulnerability in the RADIUS protocol, dubbed BlastRADIUS, leaves most networking equipment open to Man-in-the-Middle (MitM) attacks. While the vulnerability can be difficult to exploit, the possible impact of an exploit is subst… Continue reading Critical vulnerability in the RADIUS protocol leaves networking equipment open to attack

WPA(2/3)-PSK-compatible per-device Wi-Fi passwords to prevent AP MITM on IoT networks

While WPA2-PSK and WPA3-SAE are really secure once a connection has been established, my understanding is that if you have access to the Wi-Fi password you can impersonate the AP without any problems. I’m starting to add more and more IoT … Continue reading WPA(2/3)-PSK-compatible per-device Wi-Fi passwords to prevent AP MITM on IoT networks

How can Freeradius detect if the password provided is right when only the salted hash is stored in the database without the salt

I am discovering both Freeradius and the password hashing mechanism. I built a database (in MySQL) to store the passwords of some users. I have a user with the password in clear text, another one hashed in SHA256 without salt and the last … Continue reading How can Freeradius detect if the password provided is right when only the salted hash is stored in the database without the salt