Results 1 to 3 of 3

Thread: 802.1x Capture of Changing Keys

  1. #1
    Just burned his ISO
    Join Date
    Jan 2009

    Question 802.1x Capture of Changing Keys


    In my network I use 802.1x to add security. I realize this is currently one of the best options out there.
    I was attempting to pentest my network to see if it is secure and I've discovered that I can capture some data using airodump-ng and it be successfully decoded using aircrack-ng.

    This was about 50000 packet and with wireshark I was able to see part of the data I was looking at (some video on youtube). Some data packets were unreadable and I guess that they were encrypted using another key.

    When I tested it again and captured more data, I wasn't able to recover a key.

    Therefore, is it possible to capture packets so that we can find the multiple keys and decrypt all the data?

    How can I prevent this on my network? make keys change faster?


  2. #2
    Good friend of the forums
    Join Date
    Feb 2010


    you prob decoded yer own packets err maybe somebody else on your network was using the same auth info... i think even then the keys would be diff ... I know nothing of 802 auth

  3. #3


    What specific 802.1x method are you using? TTLS? TLS? LEAP? PEAP? something else?

    How can I prevent this on my network? make keys change faster?
    Change your rekey default to be quicker.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts