The WLAN Security Megaprimer from

WLAN Security Megaprimer Part 21: WPA-PSK

In this video, we will look at WPA-PSK and begin understanding its inner workings. This a pretty advanced topic, so please pay attention :) The video is also quite long at 35 minutes.

We begin by understanding how the Pre-Shared Key is derived from the Passphrase using the Password based Key Derivation Function (PBKDF). Then we move on to the WPA 4 Way Handshake and analyze each packet in detail.

The 4 Way Handshake is used to create the Pairwise Transient Key (PTK) using the Pairwise Master Key (PMK) (which is actually the Pre-Shared Key in this case), the Authenticator Nonce, the Supplicant Nonce, AP MAC address and the Client MAC address. We will look at each packet in Wireshark and match it with the 802.11i standard specifications :)

I also misspelled Nonce as Nounce on all slides :) So a few giggles there as well to cool off this difficult topic.

Video Player should be visible here. If not, install / upgrade flash

Have any Questions? or would like to add a point?

Visit the video page on SecurityTube to post your questions and comments :