Everything you need to know about DragonBlood to hack your WPA3 password for Wi-Fi
WPA or Wifi Protected Access is a standard protocol designed to authenticate wireless devices using the Advanced Encryption Standard (AES) and restrict hackers from tapping on the wireless network. Although WPA2 is secure from previous security protocols, it is vulnerable to some major cyber attacks such as KRACK (Key Reinstallation Attack).
In June 2018, Wi-Fi Alliance released WPA3, a successor to WPA2 with goals to increase encryption strength, provide strong authentication, encryption features, better and secure access to IoT wifi devices, etc.
On the one hand, we are approaching the first anniversary of the WPA3 protocol. On the other hand, some security researchers have revealed the severe weaknesses in WPA3. These flaws are so serious that they could allow an attacker to recover a Wi-Fi password.
Security researchers Mathy Vanhoef and Eyal Ronen discovered weaknesses in the early implementation of WPA3-Personal. These vulnerabilities allow a hacker to recover the WiFi passwords by exploiting the timing or leaks of a cache-based side channel.
According to researchers, "In a significant way, an attacker can then read information that WPA3 has safely encrypted." This can be misused to steal sensitive sent information such as credit card numbers, passwords, chat messages, e-mail messages, etc.
Major security flaws in WPA3
Although the latest WiFi Security WPA3 standards rely on Dragonfly, meaning that the most secure authentication is designed to prevent dictionary attacks without an Internet connection, other risks can not be ignored. In a research paper titled DragonBlood, published, security researchers have clarified two types of defects in WPA3 - leading first to lower rating attacks and second to side channel leaks.
The age of WPA2 is nearly 15 years and adoption of WPA3 in a wide range is certainly not possible overnight. The WiFi Alliance option is not available as opposed to supporting legacy devices. WPA3 devices provide "transition mode" and allow devices to accept connections using both WPA3-SAE and WPA2. This transition mode is vulnerable to downgrade attacks, which may offend attackers to set up a fake access point that only supports WPA2, thus forcing WPA3-supported devices to connect using unsecured authentication in the WPA2 direction.
"We have also discovered a reduced SAE attack, known as Dragonfly itself, where we can force the device to use a weaker elliptic curve than is normally used," the researchers said.
When talking about the other two attacks on the side channel - cache attacks (CVE-2019-9494) and time-based attacks (CVE-2019-9494), the Dragonfly password encryption method was found in itself. An attacker could allow a password-splitting attack, which is similar to an offline dictionary attack. All these attacks only hope to access a WiFi password at all costs.
"For our password-splitting attack, we want to register more than one authentications the use of different MAC addresses." we can get authentication the use of specific MAC addresses via focused on more than one clients on the identical community (for example, persuading multiple users to down load the identical malicious application) If we are most effective able to assault a unmarried purchaser, we are able to set up get right of entry to points with the identical SSID however using a spoofed MAC deal with.
Other than the above-cited assaults, the duo defined the risks of different assaults along with denial of carrier. Researchers will also trouble four separate gear on Github as proof of the concept customers can use to test those vulnerabilities:
Dragontime: A tool to carry out timing assaults towards dragonfly authentication.
Dragondrain: A tool to check whether an get entry to factor is vulnerable to Dos assaults towards Dragonfly WPA3 authentication.
Dragonforce: A device to shield in opposition to timing assaults and to execute a password splitting attack.
Dragonslayer: device implements attacks in opposition to EAP-PWD.
WiFi Alliance works with groups that increase routers to accurate stated troubles. In case you need more information approximately DragonBlood or want to study the paper, visit the authentic website.
"software program updates do not require any changes that affect interoperability among wi-fi devices." customers can cross returned to their hardware carriers' websites for greater records, "stated the WiFi Alliance in its press launch.
Report