First, we generate the PMK with the pre-shared key and ESSID of the Access Point.

	PMK = PBKDF2(PSK, ESSID, 4096)

Then, once we have the PMK, we substitute it into the next algorithm to calculate the PMKID.

	PMKID = HMAC-SHA1-128(PMK, "PMK Name", AP-Mac, St-Mac)

Wi-Fi Protected Access Overview

What is the WIFI Protected Access Networks?

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are security certification programs developed by the Wi-Fi Alliance after the year 2000 to secure wireless networks. These standards were introduced in response to significant vulnerabilities discovered in the earlier Wired Equivalent Privacy (WEP) system.

image.png

What is the authentication Types?

image.png

What Are the Two Modes for WPA Networks?

Introducing WPA/WPA2 Personal (PSK)?

Wi-Fi Protected Access (WPA) Personal was created to replace Wired Equivalent Privacy (WEP). WPA originally implemented the Temporal Key Integrity Protocol (TKIP), which used a dynamic per-packet key to address WEP's vulnerabilities, particularly those involving initialization vector attacks. In addition, WPA introduced Message Integrity Checks (MICs), improving security over the Cyclic Redundancy Checks (CRCs) used by WEP. WPA2 introduced support for CCMP and AES encryption modes, to provide more secure communications

image.png

Introducing WPA/WPA2 Personal (PSK) Attacks?