Tools to Exploit 'The Hole 196'

Discussion in 'Ethical hacking' started by WPAWHO, Nov 16, 2016.

  1. WPAWHO

    WPAWHO New Member

    Joined:
    Nov 16, 2016
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    1
    Hi All,

    I am looking to carry out a hacking project that revolves around exploiting the ‘‘Hole 196’ security loophole in WPA2 encrypted wireless networks. The exploit requires the attacker to encrypt broadcast packets with the one way Group Transient Key that is shared by the AP.

    This will be the first hacking project I have undertaken so I am unfamiliar with most of the tools on hand. Would anyone be able to recommend some packet crafting or other tools that may be suitable if there are any? If not how could I possibly go about doing this?

    Below I have linked a paper that describes the ‘Hole 196’ attack in section ‘II’ for those who are unfamiliar.

    Any help would be hugely appreciated!

    EDIT: Could not link the paper due to the anti-spam but if you google 'Advanced stealth man-in-the-middle attack in wpa2 encrypted wi-fi networks' it can be found on the second result from reaserchgate
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice