Description: Welcome to Part 34 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will explore the implementation of PEAP in Windows and touch upon the following concepts - ensuring that Certificate verification is turned on, proper radius servers are mentioned, certifying authorities for the RADIUS server's certificate are selected and finally in case there is a problem with the certificate, then the use is not prompted to accept / reject new certificates or certifying authorities.
We will once again use Asleap to crack the password using the Challenge-Response pair in MSCHAP format, sent within the TLS tunnel created during the use of PEAP.
Please do leave your comments behind!
Tags: wifi , security , megaprimer , PEAP , peap , windows ,
wow thats realy amazing, nearly every day new stuff - great
You really amaze me Vivek, uploading videos almost as fast as we can watch them. This is the 34th video of the megaprimer en you don't seem tired about it. I have no words other than gratitude towards you. Thank you!
another awesome video.thank u vivek.
wowwwwwwww.
Thanks ,
As always, thanks.
Very instructive awesome video. Thanks,
@WhiteTiger, arcadio, neo, soheil.r, m0ei, Hatcher
Thanks for all the appreciation guys!
A couple of more and this megaprimer will be finally over :)
Next video on EAP-TTLS Cracking is now online: http://www.securitytube.net/video/2044
Guess new systems don't allow any longer dictionary words as passwords. I hope..