How can a WPA2-PSK network allow a user to connect without storing the key on their device at all?

On several occasions, I’ve been connected to a WPA2-PSK network, but where the key isn’t stored on my device at all.
But since you don’t need to re-enter it every time you re-connect, how is a user allowed to connect?

Continue reading How can a WPA2-PSK network allow a user to connect without storing the key on their device at all?

Does TKIP(WPA) implement the 4-way handshake? Or only RSN(WPA2) does implement it?

1) Is this handshake (used to perform mutual authentication and to derive PTK and GTK) performed in WPA(TKIP)?
I think not, but I don’t understand why in a aircrack page it’s written that

There is no difference between cracking WPA or WP… Continue reading Does TKIP(WPA) implement the 4-way handshake? Or only RSN(WPA2) does implement it?

In WPA handshake brute force attack, how can attacker find PMK if MIC is performed using only HALF of PTK?

Brute force attack against WPA is the most common attack against WPA/WPA2 networks. Attacker captures the 4-way handshake that allows the authentication key to be cracked offline.
During the 4-way handshake, several pieces of information … Continue reading In WPA handshake brute force attack, how can attacker find PMK if MIC is performed using only HALF of PTK?

How does a password prevent an evil twin if the password is publicly known?

This discussion of WPA3 OWE seems to imply that WiFi at Starbucks/the airport/whatever can be secured against an evil twin attack if they use WPA3-Personal instead of OWE. But it seems like that wouldn’t actually do anything.
If I’m at som… Continue reading How does a password prevent an evil twin if the password is publicly known?

What kinds of attacks are eliminated in WPA2-PSK if for each device there’s a different (secret) PSK?

With regular WPA2-PSK there’s the fact that every device shares the same PSK, hence it’s possible to impersonate the AP by setting up an Evil Twin and watching the traffic. This isn’t possible without knowing the PSK, so for a setup where … Continue reading What kinds of attacks are eliminated in WPA2-PSK if for each device there’s a different (secret) PSK?

What is a logical threshold in terms of users or devices to migrate from WPA personal to WPA enterprise?

I have a question in particular about WPA’s Enterprise versus Personal without discussing the specifics of WPA2/WPA3.
I’ve encountered quite a few situations where the Personal version of WPA2/WPA3 was used while WiFi access was provided t… Continue reading What is a logical threshold in terms of users or devices to migrate from WPA personal to WPA enterprise?

Constructing PTK key from sniffed traffic and decrypting WPA2 network traffic using it

Suppose there is a WPA2/PSK access point (AP) and 2 clients are connected to it, say X and Y. So X and Y both know the password or PSK required for authentication.
From here:

In case of WPA2/PSK when device authenticates with access point… Continue reading Constructing PTK key from sniffed traffic and decrypting WPA2 network traffic using it