EAP-PEAP-MSCHAPv2: Why should I (not) use it? - Part 1 -

Поделиться
HTML-код
  • Опубликовано: 28 янв 2025
  • ХоббиХобби

Комментарии • 20

  • @PictoKai
    @PictoKai 3 месяца назад +1

    "Don't worry, it'll get worse"
    Thx for the video too. I can't wait to ask my college for permission to do this!

  • @davidibrahim7809
    @davidibrahim7809 4 года назад

    Nice video Herman. Just want to confirm something. During EAP-PEAP, what certificate does the server send from ClearPass to the client for validation? Is it the HTTPS server or RADIUS/EAP server certificate?

    • @KevinEzraTV
      @KevinEzraTV 4 года назад +1

      it sends the radius cert

  • @solollove1993
    @solollove1993 4 года назад

    Hello I wanted just to ask what can someone do if you found that your wifi was attacked using this method

    • @hermanrobers
      @hermanrobers 4 года назад

      If you find you are attacked, you will need to change the passwords for the compromised accounts, as well as see if there were successful accesses to your network and see where attackers went and did. Consider that the attackers have had the same access to your network as the attacked accounts.

    • @fernandogrin7607
      @fernandogrin7607 3 года назад

      @@hermanrobers sólo en personas te puedo ablar puedo yegar aya

    • @fernandogrin7607
      @fernandogrin7607 3 года назад

      Yegare

    • @fernandogrin7607
      @fernandogrin7607 3 года назад

      Boy aya

  • @KevinEzraTV
    @KevinEzraTV 4 года назад

    Hi Herman, I have seen the ssid cert warnings even when I have added the genuine server's radius cert in clients trust list. Is the way to prevent certificate warning.
    Should we get a public signed cert for radius or will we be able to prevent it by using domain signed certs(present in clients trust list). OR is it like https certs where we should use fqnd for common name.

    • @hermanrobers
      @hermanrobers 4 года назад +1

      Kevin, the only way not to see these RADIUS server certificate warnings is to pre-configure the SSID on the client. With WiFi there is only the SSID name, so not really a way to validate that you are connecting to a trusted network. Check this write up for some deeper explanation: blogs.arubanetworks.com/industries/trust-at-first-sight/

    • @KevinEzraTV
      @KevinEzraTV 4 года назад

      @@hermanrobers Thank you very much for the clarification.

  • @bschlueter
    @bschlueter 6 лет назад

    Is it possible to fake the server certificate?

    • @hermanrobers
      @hermanrobers 6 лет назад +1

      Good question. I the perfect world, where the certificate is validated against a public trusted root, it is not. However when you fabricate your certificates you can put anything in and if people see the information at all, the uneducated user will click if they see their company name, a well known provider name or something that states secure in it. Bottom line, unless you can completely lock down a client device to only trust specific certificates from specific certificate authorities, the user is the weakest link which is likely to fail.

  • @naveensr8888
    @naveensr8888 7 лет назад +1

    Hi bro... In my university they are providing 802.1x EAP WiFi connection for laptops after the registration of Mac address only how to hack and connect my phone.....give me some ideas

    • @hermanrobers
      @hermanrobers 7 лет назад +1

      Best would be to contact your network administrator and have the MAC address of your phone registered.

  • @doyled01
    @doyled01 7 лет назад

    how do i protect myself from this

    • @hermanrobers
      @hermanrobers 7 лет назад

      Excellent question. This is covered in the last part of video 2: ruclips.net/video/Shr5xFFGyiA/видео.htmlm47s. In summary: don't use PEAP-MSCHAPv2 unless you have full control over the client. If you are using it today, plan to move to other authentication methods where EAP-TLS is the most logical option. Check the other video.

    • @doyled01
      @doyled01 7 лет назад

      at work i connect to 802.1x eap Peap with a user name and password. we dont have IT as its a contract compnay and only come in if there is problems with wifi. any other way to secure it
      & how secure is what i am using

  • @alipentester2668
    @alipentester2668 6 лет назад

    tnx a lottt