Skip to content

When Wi-Fi Encryption Fails Protecting Your Enterprise from ...#2157

Open
carlospolop wants to merge 1 commit intomasterfrom
update_When_Wi-Fi_Encryption_Fails__Protecting_Your_Enter_20260422_132454
Open

When Wi-Fi Encryption Fails Protecting Your Enterprise from ...#2157
carlospolop wants to merge 1 commit intomasterfrom
update_When_Wi-Fi_Encryption_Fails__Protecting_Your_Enter_20260422_132454

Conversation

@carlospolop
Copy link
Copy Markdown
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

  • Blog URL: https://unit42.paloaltonetworks.com/air-snitch-enterprise-wireless-attacks/
  • Blog Title: When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks
  • Suggested Section: Pentesting Wifi (new page/subsection for "Enterprise Wi‑Fi Client Isolation Bypasses / AirSnitch primitives"; cross-link from "Pentesting Network" and possibly from spoofing/MitM sections)

🎯 Content Summary

Title / context
Unit 42 summarizes research presented at NDSS Symposium 2026 introducing AirSnitch: a set of enterprise Wi‑Fi meddler‑in‑the‑middle (MitM) primitives that break the common assumption that WPA2/WPA3 (including WPA2/3‑Enterprise) + “client isolation” prevents client‑to‑client interception/injection. The key idea is that even if over‑the‑air payloads are encrypted, attackers can exploit protocol–infrastructure interactions across encr...

🔧 Technical Details

Shared-key abuse for injection (GTK misuse): In WPA, the four-way handshake distributes a shared Group Temporal Key (GTK) to all clients in the same BSSID to support multicast/broadcast. If an attacker can obtain the GTK (e.g., by modifying wpa_supplicant to extract it), they can encrypt attacker-crafted 802.11 multicast/broadcast frames with GTK but embed unicast IP payloads destined for a victim. This turns group-key support into a client-isolation bypass, enabling packet injection on WPA2/WPA3-Enterprise networks.

L2-only isolation bypass via routing (Gateway Bouncing): If an AP enforces client isolation at Layer 2 (e.g., hostapd ap_isolate=1) but not at Layer 3, an attacker can send frames to the gateway’s MAC (permitted) while setting the vi...

🤖 Agent Actions

I’m mapping the repository first, then I’ll read the existing Wi-Fi and network pages to decide whether this belongs in an existing Wi-Fi page or needs a new page.
I found the obvious candidate sections. Next I’m reading the existing Wi-Fi and network pages in detail to avoid duplicating techniques that HackTricks already covers.
The network README already has a generic L3 private-VLAN bypass, but not the enterprise Wi-Fi specifics from AirSnitch. I’m checking whether the Wi-Fi page already covers GTK misuse, broadcast reflection, or port-stealing before deciding on a single-file edit.
I’ve confirmed the main gap: HackTricks covers WPA cracking, evil twins, and a generic routed private-VLAN bypass, but not the enterprise Wi-Fi client-isolation bypass primitives introduced here. I’m checking the Wi-Fi page’s ending structure so I can insert one concise subsection and update references in the same file only.
I’ve settled on a single-file update in the Wi-Fi methodology page. The addition will sit under the WPA-Enterprise section because these are not generic network MITM tricks; they are enterprise Wi-Fi client-isolation bypass primitives that depend on WPA/BSSID/AP behavior.
The edit is in place. I’m doing a final pass on the rendered section and the diff to make sure the insertion point, references, and single-file constraint are all clean.
Updated src/generic-methodologies-and-resources/pentesting-wifi/README.md with a new WPA Enterprise (MGT) subsection for AirSnitch-style enterprise Wi-Fi client-isolation bypasses.

I kept it to one file and focused on the parts HackTricks was missing: Gateway Bouncing, Port Stealing, GTK misuse, Broadcast Reflection, chaining into full MitM, and concise detection/hardening notes. I also added the Unit 42 blog and NDSS paper to the existing ## References section. No new page was created because the Wi-Fi methodology page was the best fit, and the generic routed-isolation angle was already partially covered in the network README.


This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Copy Markdown
Collaborator Author

🔗 Additional Context

Original Blog Post: https://unit42.paloaltonetworks.com/air-snitch-enterprise-wireless-attacks/

Content Categories: Based on the analysis, this content was categorized under "Pentesting Wifi (new page/subsection for "Enterprise Wi‑Fi Client Isolation Bypasses / AirSnitch primitives"; cross-link from "Pentesting Network" and possibly from spoofing/MitM sections)".

Repository Maintenance:

  • MD Files Formatting: 972 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant