Attacking PEAP

Protected Extensible Authentication Protocol (PEAP) is the most popular version of EAP in use. This is the EAP mechanism shipped natively with Windows.

PEAP has two versions:

  • PEAPv0 with EAP-MSCHAPv2 (the most popular as this has native support on Windows)
  • PEAPv1 with EAP-GTC

PEAP uses server-side certificates for validation of the RADIUS server. Almost all attacks on PEAP leverage misconfigurations in certificate validation.

In the next lab, we will take a look at how to crack PEAP when certificate validation is turned off on the client.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.109.151