29Tem
Wifi Handshake Hijack
In a normal wifi network, after authentication we associate and then perform a handshake (WPA2: 4-way handshake, WPA3: dragonfly handshake) with the AP. How does a client now know that the frames associated with the handshake are really from the AP and not from a potential attacker physically near the wifi range?