Steve,Unfortunately attacking WPA-PSK doesn't reqriue any kind of Evil-Twin or MITM (or any kind of ARP hijinks) if you have the PSK. All you have to do is capture the 4-way handshake for a session, and with the PSK in hand, derive the same PTK to decrypt traffic.The PTK is derived from the PMK (basically a derivation of the PSK) and a pair of nonces generated by the client station and the access point. These nonces are exchanged in the clear.And with that same lack of authentication you mention, an attacker can issue a deassociation packet forcing any arbitrary client to perform a 4-way handshake at will.To be completely clear: The PSK is the *only* secret in WPA-PSK, and anyone who has the PSK and is monitoring traffic can decrypt all of the traffic.I'm not completely sure why WPA-PSK doesn't use a DH key exchange for the PTK. Probably because the protocol isn't designed to be secure against people possessing the keying material. But it just doesn't.Regards,Sam
A conductor is the one who leads a choir
southpaw
The leader is called a conductor.
== == == == Necrophiliac.
A Nickname.
There does not appear to be a name for it.
A portrait ...
nope
One can buy insurance leads from Net Quote, Quote Wizard, Agent Insider, Insure Me, Precise Leads, All Web Leads, Parasol Leads, iQuoteX, iLeads, ABC Leads, Prospect Zone, to name a few.
cunductor
Weird
A soloist.