PBKDF2

Поделиться
HTML-код
  • Опубликовано: 30 сен 2024
  • Web page:
    asecuritysite.c...

Комментарии • 6

  • @CarlosMorales-nj7sv
    @CarlosMorales-nj7sv 3 года назад

    Question, this means that if I know the pass phrase and the SSID (salt) and if I do a packet capture I would be able to decrypt the conversations going around using the calculated key?

    • @FA-kd4gx
      @FA-kd4gx 3 года назад

      True. However, to my knowledge once SSL is used all be encrypted.

  • @miguelgrilo5853
    @miguelgrilo5853 4 года назад

    0:39 is a Rainbow Table Attack, not a Dictionary Attack

    • @larryd9577
      @larryd9577 2 года назад +2

      Dictionary attack is correct, because rainbow tables are an special implementation of a dictionary using a time memory tradeoff.

  • @tripsd5929
    @tripsd5929 7 лет назад

    Wanted a clarification on 1st slide.
    You wrote - WPA-2 PSK = PBKDF2 (PassPhrase, SSID, 4096, 256)
    Which one of the inputs to PBKDF2 is the salt ?

    • @neithanm
      @neithanm 6 лет назад +4

      It's written right there a few centimeters on the right -> "salt = ssid"