AirSnitch - Old WiFi attacks updated, refurbished

13 views
Skip to first unread message

Kurt Buff

unread,
Feb 26, 2026, 6:10:42 PM (14 days ago) Feb 26
to ntsys...@googlegroups.com
I've quickly searched for 802.1x in the linked paper, but it's very unclear to me what flavor they were able to compromise. 
Specifically, it doesn't look like they tried a network where the auth is mutual TLS, and they were able to break one using user IDs and passwords, based on how this was worded. 
Also, it was noted that proper implementation of VLANs seems to provide protection.

"Paper co-author Mathy Vanhoef, said a few hours after this post went live that the attack may be better described as a Wi-Fi encryption “bypass,” “in the sense that we can bypass client isolation. We don’t break Wi-Fi authentication or encryption. Crypto is often bypassed instead of broken. And we bypass it ;)” People who don’t rely on client or network isolation, he added, are safe."

Link to original paper here:

Kurt
Reply all
Reply to author
Forward
0 new messages