Which attributes of a WPA AP certificate are used by a client device in deciding if the certificate has been trusted before?

When connecting to a new AP, the client device will pop a warning to ask if the certificate of the new AP should be trusted. If trusted, the warning doesn’t show anymore if the certificate is known to have been trusted before… Continue reading Which attributes of a WPA AP certificate are used by a client device in deciding if the certificate has been trusted before?

How feasible would it be to sniff traffic between an Authentication Server and a RADIUS server in a corporate setting?

For WPA enterprise in the corporate world, is the RADIUS server connected to the Authenticator/Access Point wirelessly or ‘wiredly’ for most situations? If they are connected wirelessly, does this mean that it becomes somewha… Continue reading How feasible would it be to sniff traffic between an Authentication Server and a RADIUS server in a corporate setting?

Is the keystream recovered by tkiptun-ng the same key used to encrypt all data frames between the client and the AP?

Looking at the manual for tkiptun-ng,(http://www.aircrack-ng.org/doku.php?id=tkiptun-ng) The output saves the keystream in the example near the end of the program. Is this the same keystream used to encrypt all the data traff… Continue reading Is the keystream recovered by tkiptun-ng the same key used to encrypt all data frames between the client and the AP?

Which key is actually used for encrypting data traffic in WPA after the 4WHS?

Some sites say that the PTK is used for encrypting the data between the client and the WAP while others say that the PMK is used instead. Which one is true?

From what I understand, this can have very different security impli… Continue reading Which key is actually used for encrypting data traffic in WPA after the 4WHS?