Tags: , , ,

Forum Replies

  1. Many thanks dear… perfect post

  2. Hi Francisco,

    You are welcome. Wireless pentesting is pretty fun and a good method to learn more about wireless. There are a couple of RADIUS related attacks that you can do from the wireless side.

    The first one you might want to try is LEAP as it is vulnerable to offline dictionary / brute-force techniques. We don’t use LEAP anymore in the field…

    PEAP is also fun, the wireless client only has to authenticate the radius server so it’s possible to spoof it. When the client sees the certificate of the fake radius server they have to decide if they want to accept

    ... Continue reading in our forum

  3. Hi Rene

    The tutorials help me a lot with Windows enviorment thanks, but now I have the following issues I hope you can help me,

    The topology is

    Two servers(2012R2) with NPS(they are in two tier CA authority rootCA->subCA->userCA)
    Scalance Accespoints W788(pointing to the two NPS servers)
    Linux embedded box(supplicants)

    The problem is when the linux box connects to the NPS server, I get in the NPS sever Event ID 6273 Reason Code 48 y tried to modified network policys but no luck, the linux box is configured like this in the wpa_supplicant.conf (I still dont put

    ... Continue reading in our forum

  4. Hi Eugenio,

    You are welcome. Event ID 6273 Code 48 normally means that there was no match with any of your NPS policies. I would start by checking those, see if you forgot anything…make sure the incoming request matches your policy.

    Your wpa_supplicant.conf file looks fine, if you use PEAP then you won’t need any client certificates. The client will validate the server certificate but you can choose to ignore this.


121 more replies! Ask a question or join the discussion by visiting our Community Forum