Twitter | Pretraživanje | |
Dominic White
Here's a detailed write-up of the EAP bug that affected all Apple devices (except watchOS), CVE-2019-6203. It includes a deep dive into MSCHAPv2 there's some code at too
A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better - sensepost/understanding-eap
GitHub GitHub @github
Reply Retweet Označi sa "sviđa mi se" More
Dominic White 18. tra
Odgovor korisniku/ci @singe
This might also be useful for WiFi generalists studying for their CWNP or CWNE cc @robrobstation
Reply Retweet Označi sa "sviđa mi se"
Dominic White 21. tra
Odgovor korisniku/ci @_cablethief
from looks exciting. Sycophant can not only get you on the network but let you keep the victim device connected to your rogue AP.
Reply Retweet Označi sa "sviđa mi se"
Glenn Wilkinson 🇿🇼 19. tra
Odgovor korisniku/ci @singe
Reply Retweet Označi sa "sviđa mi se"
Dominic White 19. tra
Odgovor korisniku/ci @glennzw
For macOS and tvOS too ;)
Reply Retweet Označi sa "sviđa mi se"
Adam Toscher 18. tra
Odgovor korisniku/ci @singe @brad_anton
I wonder if this is why the EAP-GTC downgrade works too ? Apple/Android need to address this issue. Once again something had buit into his code but didn't report?
Reply Retweet Označi sa "sviđa mi se"
Dominic White 18. tra
Odgovor korisniku/ci @W00Tock @brad_anton
I'll get around to that next :)
Reply Retweet Označi sa "sviđa mi se"
Brad Antoniewicz 18. tra
Odgovor korisniku/ci @singe
great write up and thanks for the shouts!
Reply Retweet Označi sa "sviđa mi se"
Dominic White 18. tra
Odgovor korisniku/ci @brad_anton
You’re welcome ;)
Reply Retweet Označi sa "sviđa mi se"
Mathy Vanhoef 16. svi
Odgovor korisniku/ci @singe
Nice work! We wanted to study issues like this as well, but haven't found the time. Are you planning any follow-up work? :)
Reply Retweet Označi sa "sviđa mi se"