Authentication & Authority
  • CHAP(Challenge-Handshake Authentication Protocol)
    • ASLEAP - EXPLOITING CISCO LEAP
    • After the completion of the link establishment phase, the authenticator sends a "challenge" message to the peer.
    • The peer responds with a value calculated using a one-way hash function, such as an MD5 checksum hash.
    • The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection.
    • At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3.
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License