12-09-2024, 11:42 AM
Hi,
Thank you very much for your detailed response. I was suspecting that iPhone is using WPA3, but I was misled by the fact that Bettercap showed it as "WPA2". Also, I don't have any knowledge about new tools (hcxpcapngtool and so on), so I was not able to understand the output. The only part that I not fully understand from your message is when you say:
So with this, you're saying that even if a AP is using WPA3 there is a way to let a client to try to use WPA2, capturing the corresponding handshakes as if the AP is using WPA2 normally?
Also I know nothing about WPA3 protocol, but how is it possible that there are no handshakes using it? I mean, client and AP should exchange information in order to reach authentication somehow.
Thank you very much for your detailed response. I was suspecting that iPhone is using WPA3, but I was misled by the fact that Bettercap showed it as "WPA2". Also, I don't have any knowledge about new tools (hcxpcapngtool and so on), so I was not able to understand the output. The only part that I not fully understand from your message is when you say:
(12-08-2024, 08:41 PM)ZerBea Wrote: A solution: To get an EAPOL M2 message (WPA2) try to downgrade the CLIENT to WPA2 (AP-LESS attack by hcxlabtool/hcxdumptool).
So with this, you're saying that even if a AP is using WPA3 there is a way to let a client to try to use WPA2, capturing the corresponding handshakes as if the AP is using WPA2 normally?
Also I know nothing about WPA3 protocol, but how is it possible that there are no handshakes using it? I mean, client and AP should exchange information in order to reach authentication somehow.