<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WPA-PSK Authentication process in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wpa-psk-authentication-process/m-p/332303#M20672</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a very useful 10-page security analysis on WPA/WPA2 PSKs at the URL below. Not only does it demonstrate a WPA2 PSK being cracked using the OG150, it discusses the mechanics behind PSKs, the cracking process and more....&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="http://www.og150.com/tutorials.php"&gt;http://www.og150.com/tutorials.php&lt;/A&gt;&lt;BR /&gt;Go to: Wireless Pre-Shared Key Cracking (WPA, WPA2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Mar 2013 02:12:36 GMT</pubDate>
    <dc:creator>dazza_johnson</dc:creator>
    <dc:date>2013-03-29T02:12:36Z</dc:date>
    <item>
      <title>WPA-PSK Authentication process</title>
      <link>https://community.cisco.com/t5/wireless/wpa-psk-authentication-process/m-p/332301#M20670</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to understand how does WPA-PSK works (without any RADIUS server)... I understand that with WPA the keys are generated dynamically (PMK keys). Who generates them if there are no radius server? How often are they changed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ruben&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 17:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-psk-authentication-process/m-p/332301#M20670</guid>
      <dc:creator>ruben.montes</dc:creator>
      <dc:date>2021-07-04T17:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: WPA-PSK Authentication process</title>
      <link>https://community.cisco.com/t5/wireless/wpa-psk-authentication-process/m-p/332302#M20671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you use WPA-PSK, you statically configure the PMK. Based on the PMK, the WEP key incrememts one for each packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WPA-PSK does not change the PMK.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Dec 2004 18:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-psk-authentication-process/m-p/332302#M20671</guid>
      <dc:creator>dixho</dc:creator>
      <dc:date>2004-12-29T18:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: WPA-PSK Authentication process</title>
      <link>https://community.cisco.com/t5/wireless/wpa-psk-authentication-process/m-p/332303#M20672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a very useful 10-page security analysis on WPA/WPA2 PSKs at the URL below. Not only does it demonstrate a WPA2 PSK being cracked using the OG150, it discusses the mechanics behind PSKs, the cracking process and more....&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="http://www.og150.com/tutorials.php"&gt;http://www.og150.com/tutorials.php&lt;/A&gt;&lt;BR /&gt;Go to: Wireless Pre-Shared Key Cracking (WPA, WPA2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Mar 2013 02:12:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-psk-authentication-process/m-p/332303#M20672</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2013-03-29T02:12:36Z</dc:date>
    </item>
  </channel>
</rss>

