War Never Changes: Attacks Against WPA3’s Enhanced Open — Part 1: How We Got Here

War Never Changes: Attacks Against WPA3’s Enhanced Open — Part 1: How We Got Here






In early 2019, myself and fellow Denver-based researcher Steve Darracott (@theDarracott) set out to answer the question — “is Opportunistic Wireless Encryption (OWE) susceptible to abuse and attack, and if so, how?”. Ultimately, we succeeded in implementing multiple working proof of concept attacks, which we demonstrated at the DEF CON Wireless Village last summer. This series of blog posts documents our research efforts and conclusions, and discusses how OWE fits into the current wireless threat model.

This collection of blog posts contains a lot of information. As such, I have broken it into three sections that are intended to satisfy the needs of both non-technical audiences and audiences of varying technical skill levels. These sections are as follows:


  • Part I: How We Got Here — Introductory post (you’re currently reading it). Historical context and background information that demonstrates why this research matters. Suitable for non-technical audiences and technical audiences that care about the bigger picture. This is arguably the most important post in the series.

  • Part II: Understanding OWE — Technical deep-dive into the nuts and bolts of ..

    Support the originator by clicking the read the rest link below.