This video covers all the flaws Mathy Vanhoef and Eyal Ronen discovered in WPA3 and the dragonfly handshake used in it. Link to the full paper (Dragonblood: A Security Analysis of WPA3's SAE Handshake): https://papers.mathyvanhoef.com/dragonblood.pdf Tools to test whether a network is vulnerable or not: Dragonslayer: https://github.com/vanhoefm/dragonslayer Dragondrain: https://github.com/vanhoefm/dragondrain-and-time Dragontime: https://github.com/vanhoefm/dragondrain-and-time Dragonforce: https://github.com/vanhoefm/dragonforce --------------------------------------------------------------- ✳️ Subscribe and use this link to opt-in to the course giveaway 👇 https://forms.gle/987ViTu4tH6Ah3PcA --------------------------------------------------------------- 🧠 My hacking courses 👇 https://zsecurity.org/courses/ --------------------------------------------------------------- Website - https://zsecurity.org/ Facebook - https://www.facebook.com/ZSecurity-1453250781458287/ Twitter - https://twitter.com/_zSecurity_ Instagram - https://www.instagram.com/zsecurity_org/ Linkedin - https://www.linkedin.com/company/zsecurity-org/ --------------------------------------------------------------- ⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️