{"guid":"1efa803c-d280-49f0-bd17-8ec8f28e054f","title":"Predicting and Abusing WPA2/802.11 Group Keys","subtitle":null,"slug":"33c3-8195-predicting_and_abusing_wpa2_802_11_group_keys","link":"https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8195.html","description":"We analyze the generation and management of WPA2 group keys. These keys protect broadcast and multicast Wi-Fi traffic. We discovered several issues and illustrate their importance by decrypting all group (and unicast) traffic of a typical Wi-Fi network.","original_language":"eng","persons":["Mathy Vanhoef"],"tags":["Security"],"view_count":1464,"promoted":false,"date":"2016-12-27T14:00:00.000+01:00","release_date":"2016-12-27T01:00:00.000+01:00","updated_at":"2026-02-01T22:15:12.862+01:00","length":3621,"duration":3621,"thumb_url":"https://static.media.ccc.de/media/congress/2016/8195-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2016/8195-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2016/1efa803c-d280-49f0-bd17-8ec8f28e054f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2016/1efa803c-d280-49f0-bd17-8ec8f28e054f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/33c3-8195-predicting_and_abusing_wpa2_802_11_group_keys","url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_title":"33C3: works for me","conference_url":"https://api.media.ccc.de/public/conferences/33c3","related":[{"event_id":3598,"event_guid":"f75d0531-ac47-4edd-99bd-9eadd836982a","weight":30},{"event_id":3599,"event_guid":"c54bec28-0cec-4472-9a0f-36be8b626dd7","weight":23},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":67},{"event_id":3602,"event_guid":"48e016a4-5683-4bda-8976-98f1dbf62787","weight":24},{"event_id":3603,"event_guid":"798573a8-f544-48f0-abaf-ebc405f03f4a","weight":26},{"event_id":3604,"event_guid":"1275f046-e52e-4b0b-9f5b-7eb2008b2ec4","weight":34},{"event_id":3605,"event_guid":"61f9d4c6-a3de-4958-a57c-efcf941668fa","weight":40},{"event_id":3606,"event_guid":"1aa7a4c5-1a3f-444f-99fb-e9c7b4744794","weight":25},{"event_id":3607,"event_guid":"64c07cb5-ec19-4972-a2c8-96c0e0df83c6","weight":51},{"event_id":3608,"event_guid":"a0c851a1-b44e-46cb-bbb8-db966bc8639b","weight":24},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":28},{"event_id":3612,"event_guid":"c92203a0-9158-4111-ab52-5dacd0e46c73","weight":24},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":31},{"event_id":3617,"event_guid":"cb67ad7f-7e12-4f34-aec0-748a61f3f958","weight":31}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T16:52:27.665+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/DRAFT_33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/50335","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":230,"length":3621,"mime_type":"video/mp4","language":"eng","filename":"33c3-8195-eng-Predicting_and_Abusing_WPA2_80211_Group_Keys.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-27T19:12:51.773+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8195-eng-Predicting_and_Abusing_WPA2_80211_Group_Keys.mp4","url":"https://api.media.ccc.de/public/recordings/13551","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":270,"length":3621,"mime_type":"video/mp4","language":"deu","filename":"33c3-8195-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-27T19:13:25.364+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8195-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys.mp4","url":"https://api.media.ccc.de/public/recordings/13552","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":355,"length":3621,"mime_type":"video/mp4","language":"eng-deu","filename":"33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-27T19:14:07.510+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_hd.mp4","url":"https://api.media.ccc.de/public/recordings/13553","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":141,"length":3621,"mime_type":"video/webm","language":"eng-deu","filename":"33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-28T12:14:54.308+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-sd/33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/13689","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":149,"length":3621,"mime_type":"video/mp4","language":"eng-deu","filename":"33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-28T12:15:40.955+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-sd/33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_sd.mp4","url":"https://api.media.ccc.de/public/recordings/13690","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":290,"length":3621,"mime_type":"video/webm","language":"eng-deu","filename":"33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T12:18:02.157+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/13692","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":46,"length":3608,"mime_type":"audio/opus","language":"eng","filename":"33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-28T14:58:09.934+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/opus/33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_opus.opus","url":"https://api.media.ccc.de/public/recordings/13688","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":55,"length":3608,"mime_type":"audio/mpeg","language":"eng","filename":"33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-28T14:58:10.022+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/mp3/33c3-8195-eng-deu-Predicting_and_Abusing_WPA2_80211_Group_Keys_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/13687","event_url":"https://api.media.ccc.de/public/events/1efa803c-d280-49f0-bd17-8ec8f28e054f","conference_url":"https://api.media.ccc.de/public/conferences/33c3"}]}