


In this example, two Pairwise Master Keys (PMKs) are derived from Radius packets captured from ISE 2.3, as the session timeout on this SSID is 1800 secs, and the capture given here is 34 mins (2040 secs) long.Īs shown in the image, EAP-PEAP is used as an example, but this can be applied to any dot1x based wireless authentication. If your network is live, ensure that you understand the potential impact of any command.

All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. The information in this document is based on these software and hardware versions:

Prerequisites RequirementsĬisco recommends that you have knowledge of these topics: Hence, many enterprises choose dot1x with Remote Authentication Dial-In User Service (RADIUS ) as a better security solution for their wireless network. Cracking a hard-coded password is just a matter of time. However, Pre-shared Key (PSK) is not always recommended from a security perspective. It is relatively easy to decrypt PSK based/WPA2-personal 802.11 OTA capture as long as the full four-way EAP over LAN (EAPoL) handshakes are captured. This document describes a how-to of decrypting Wi-Fi Protected Access 2 - Enterprise (WPA2-Enterprise) or 802.1x (dot1x) encrypted wireless over-the-air (OTA) sniffer, with any Extensible Authentication Protocol (EAP) methods.
