Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/17013
Full metadata record
DC FieldValueLanguage
dc.contributor.authorROBYNS, Pieter-
dc.contributor.authorBONNE, Bram-
dc.contributor.authorQUAX, Peter-
dc.contributor.authorLAMOTTE, Wim-
dc.date.accessioned2014-07-28T12:57:44Z-
dc.date.available2014-07-28T12:57:44Z-
dc.date.issued2014-
dc.identifier.citationWiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, p. 189-194-
dc.identifier.isbn9781450329729-
dc.identifier.urihttp://hdl.handle.net/1942/17013-
dc.description.abstractMany of today's enterprise-scale wireless networks are protected by the WPA2-Enterprise Protected Extensible Authentication Protocol (PEAP). In this paper it is demonstrated how an attacker can steal a user's credentials and gain unauthorized access to such networks, by utilizing a class of vulnerable devices as MSCHAPv2 challenge response oracles. More specifically this paper explains how on these devices, Lightweight EAP (LEAP) MSCHAPv1 credentials can be captured and converted to PEAP MSCHAPv2 credentials by using a rogue Access Point. This man-in-the-middle vulnerability was found to be present in all current versions of Apple's iOS and OS X operating systems, and may impact other devices as well. A proof-of-concept implementation is available that shows how Authentication Server certificate validation and certificate pinning mechanisms may be bypassed. Mitigation strategies for the attack and protective actions which can be undertaken by end-users are also described in this paper.-
dc.language.isoen-
dc.publisherACM-
dc.rightsPermission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org-
dc.subject.otherNetwork security; WPA2-Enterprise; PEAP; LEAP-
dc.titleShort paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles-
dc.typeProceedings Paper-
local.bibliographicCitation.conferencedate23-25/07/2014-
local.bibliographicCitation.conferencenameACM conference on Security and privacy in wireless & mobile networks-
local.bibliographicCitation.conferenceplaceOxford, UK-
dc.identifier.epage194-
dc.identifier.spage189-
local.bibliographicCitation.jcatC1-
local.publisher.placeNew York, NY, USA-
local.type.refereedRefereed-
local.type.specifiedProceedings Paper-
local.identifier.vabbc:vabb:378545-
dc.identifier.doi10.1145/2627393.2627411-
local.bibliographicCitation.btitleWiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks-
item.accessRightsOpen Access-
item.fullcitationROBYNS, Pieter; BONNE, Bram; QUAX, Peter & LAMOTTE, Wim (2014) Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. In: WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, p. 189-194.-
item.contributorROBYNS, Pieter-
item.contributorBONNE, Bram-
item.contributorQUAX, Peter-
item.contributorLAMOTTE, Wim-
item.fulltextWith Fulltext-
item.validationvabb 2018-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
p189-robyns.pdfPublished version544.64 kBAdobe PDFView/Open
Show simple item record

SCOPUSTM   
Citations

12
checked on Sep 2, 2020

Page view(s)

40
checked on Sep 7, 2022

Download(s)

28
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.