WPA3 Enterprise Wifi workaround? - OnePlus 8T Questions & Answers

So my college has a wifi setup where I have to use a User Name and password.
EAP method is PEAP.
Phase 2 Authentication MSCHAPV2
The issue is they do not provide a certificate.
This is using the Android 11 that comes on the Oneplus 8T I unlocked it and rooted it.
Android 11 security patch does not allow you to connect to non-certificated WPA3 wifi connections.
My Oneplus 7 Pro on Android 10 had no issues using the exact same connection settings.
Has anyone experienced this or know of a work around. It seems with all new samsung devices using Android 11 they have no issues. Just my Oneplus 8T.
There must be a patch or a mod I even tried changing the file for the saved internet connection. No success.
Reference this for the security patch
PSA: Android 11 will no longer let you insecurely connect to enterprise WiFi networks
The Android 11 update will break connecting to certain enterprise WiFi networks. Here's why and what you can do to fix it.
www.xda-developers.com
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}

Option 1: Add you College's public key to the trusted keys. I am not sure how that Auth method really works, but I suppose that the connection is signed by a self-signed certificate.
Try to get your hands on it and add it under Settings > Security.
Option 2: Ask your College to fix this. If they have not signed their encryption/auth method (again, I don't really know how WPA3 Enterprise works, and I suppose that some keys are automatically generated on setup), ask them to do so. If their signatures are outdated or somehow not working ask them to regenerate them properly.

I have not been successful last few days getting anything from the schools IT department telling them it don't work is like speaking another language.
There has to be a away to force Android to allow a connection. I'm willing to edit what ever files or settings via root editing that's needed. I searched the deepest parts of the internet without any luck this disappointing..

Try update system to latest build, because i can select "Do not validate" with a warning message below.
Two builds earlier "OnePlus8TOxygen_15.O.21_0215_2101010247"s changelog mentioned:
Network
• Fixed the issue that the WiFi connection failed in a specific situation

Related

Check your WPA WEP security via android ;-)

Well this is no way intended for you to go and get yourself in trouble, so you assume all responsibility I'm simply providing a way to test the vulnerability of your OWN Personal wireless network. This is for thomson speedtouch wifi routers u can check if your ssid shows up and execute it
I am not responsible for your phone blowing up, freezing turning into a jet plane building u a island replicating into an phone etc etc.
here we go:
Your going to be using stkeys, Python and Android scripting environment
stkeys is a little tool demonstrating a weakness in the thomson speedtouch wifi router default wpa key. The default wep/wpa key is generated by an algorithm which is based on the serial number and so is the default SSID. The algorithm was cracked a long time ago and is a nice demonstration of what you shouldn't rely on for security.
o do this you need the android scripting environment, which you can install from my DB http://db.tt/l3O3hPG
After you've installed the scripting environment start it in apps, (it's called SL4A)
Press menu, then view, then Interpreters, then menu again, then add and in this menu you can select the python interpreter.
When the interpreter is installed you can run python scripts
Next what you want to do is download the modified python script you can get that from my DB. http://db.tt/jfkmgBP
save the script on your sd card in the directory /SL4A/scripts
Next time you run the ase on your phone the script is available.
then
execute it.
select the speedtouch SSID (if there is any)
within minutes you get possible ssid keys. you can check if yours shows up.
have fun!
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
interesting...
i wish it was possible for us to check our equipment no matter what kind of router we have...
you know for educational purposes and all
I was told it worked some other routers too btw....
Ive got it running but no keys show up. ive tried on 4 different networks. How long does it take?

[APP][4.1+]WiFi and lockscreen Auto Toggle

I had this app already available for some time, but now that I'm using root access and/or the Xposed framework in the newest version it's probably somewhat relevant for XDA developers!
WiFi Auto Toggle allows you to do few things depending on your WiFi connection:
Auto-Toggle WiFi
Build on the WiFi background scanning function on Android 4.3 the app can scan for WiFi access points even when WiFi is turned off. So what the app is doing here is disabling WiFi when you leave your home network, and automatically re-enable it when you're back.
Auto-Toggle lock screen
When you are in a trusted location you're probably tired of entering your PIN code all the time. WiFi Auto Toggle is doing this job for you and disables your lockscreen when you are connected to a trusted WiFi network.
Limitations
Disabling the lockscreen works without root on a 'normal' phone on Jelly Bean and Kit Kat. But there are limitations on some phones and on newer Android versions:
* If you have a Samsung phone then root access is needed to work around Samsung's firmware modifications. This is done by an Xposed module that comes built-in with the app.
* If you are already running Android L then SuperSU is required to get the persistent background process running that is needed to toggle the lock screen. Due to new SELinux limitations however this process can no longer be launched without root. Also it currently doesn't work with other Superuser apps, it's only working with SuperSU. Root apps need to switch the SELinux context and SuperSU is the only one supporting this.
Links
Google Play: https://play.google.com/store/apps/details?id=com.ramdroid.wifiautotoggle
Blog: http://wifiautotoggle.blogspot.de/
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
thanks
thank you for the app, i'm gonna try it out.
had a few similar apps before , but none of them was a keeper.
thanks bro
Thanks @ramdroid77 for this module!
Can you please add a option to disable data when wifi are connected to a network?
Thanks in advance
Enviado do meu LG-D802 através de Tapatalk

Major Security vulnerability in ALL versions of android

This. Is. Major.
So, I have been meaning to create an xda-developers account for a while. And one of the reasons is this - a major security vulnerability potentially usable for data theft.
On all versions of android, If you have root, you can find information for ALL (previously, i think even if you press forget) wifi networks you have connected to. Even by WPS. The same goes for p2p. The file is located in /data/misc/wifi/ and is called wpa_supplicant.conf (p2p_supplicant.conf for p2p). This file contains a lot of sensitive information like the mac addresses, ssid's and passwords/passkeys. Keep in mind that these are ALL entirely unencrypted and are plain text format.
Here is an example of mine:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
You may be wondering: so this only affects root users?
Well, the answer is no.
An app could perform temporary root and send a copy of the wpa_supplicant.conf file to an attacker
and of course, an ordinary user would be none the wiser, for the root would be gone on the next boot up and they would not even have a clue what root is.
I do alot of root projects and it is my passion. This is something I have come across over time. I know this is the case from as far back as android eclair (2.1) to android oreo (8) but dont have an older android device to test it with.
Also, please try to mark this as a helpful post. I think I have made a breakthrough in Htc Wildfire Buzz (and potentially other devices) Network Unlocking via Root, but I cant post it here.
huh? This is not an exploit, if you say so then all the devices running an operating system is potentially exploitable. It all comes down to application's trust and system firewall to prevent this from happening.
Besides you don't need to root/administrator privileges to get MAC ID, wifi password on any operating system.
SpiritBreak3r said:
huh? This is not an exploit, if you say so then all the devices running an operating system is potentially exploitable. It all comes down to application's trust and system firewall to prevent this from happening.
Besides you don't need to root/administrator privileges to get MAC ID, wifi password on any operating system.
Click to expand...
Click to collapse
Ah yes sorry i confused it! Either way, this is major, root or no root

Can someone help me return this phone to factory settings?

Whenever I try to format to factory settings it says 'No PDP scenario exists!'. I'm not sure if it's normal or if there's even anything wrong with it. I was hoping somebody here could look at these logs:
Under the hood copied - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.
pastebin.com
Thanks.
maybe this
Samsung account
us.community.samsung.com
raul6 said:
maybe this
Samsung account
us.community.samsung.com
Click to expand...
Click to collapse
I've read that thread a few times, there doesn't seem to be much of a solution. However, this post resembles my issues:
I have the same issue & have taken it to Samsung to do the oem flashing twice! Since I first powered the phone up my root folder files were timestamps "Dec 31 2008"!? & other priv app files "1st Jan 1970" this even persists across a re-flash & or factory reset! My local Samsung shop said they haven't got the expertise to offer a solution!... 3 mobile haven't returned my calls for help either! I believe I've managed to figure it out through a huge amount of research & in my case its due to a TROJAN RAT that uses the Bluetooth vulnerabilities to access & gain complete control of the phone & in my case during the initial startup sequence! Its a variety of the Trojan Agent banbra/aka "Black Moon"... it sets up SSH remote access control & it adapts very quickly to any security changes or updates, it has cloud support & i can only copy it out to shared storage to have it detected & removed as Ransomware (by Malwarebytes) but unfortunately the parent files are unaffected. It also encrypts selected files. It can even inject code & is a master manipulator of Web pages with XSS vulnerabilities & it very very infectious. Since this phone was delivered to me I've lost control of all my pc's, laptops,even Linux & my iPhones via Bluetooth or by hijacking the router. Any help would be very much appreciated!!
Due to my router and other systems being affected, running ADB is useless.
I'll pay someone to find a solution, the logs I posted can explain the issue far better than I can. Thanks again.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}

Question Xiaomi 13 - Wi-Fi portable hotspot MAC address (BSSID) randomication

Good day.
I have the following problem.
My Phone is Xiaomi 13 (global version). Codename is "fuxi".
My rom at the moment is stable "xiaomi.eu_multi_FUXI_V14.0.24.0.TMCCNXM_v14-13"
Please be advised that every time switching on the Wi-Fi portable hotspot (for internet sharing), the MAC address (BSSID) is changed in the phone.
And the problem is Wi-Fi adapter (TP-Link TL-WN725N v3) in my car (Kia Sorento Prime) recognized it as different hotspots, and therefore not connects automatically. I have to mannually connects to new hotspot everytime. Photo and screenshots attached.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
FYI, my previous phone Xiaomi Mi6 had a static BSSID of portable hotspot and the car always connects automatically which was great.
I have been looking in settings for everything related to Wi-Fi for a long time and found the following:
1. Developer options > Wi-Fi non-persistent MAC randomication
This option doesn't work! I tried ON/OFF - no any difference.
Screenshot attached.
2. Password & security > Privacy > Protection from Wi-Fi probe requests
Alternative name is "Wi-Fi Probe Protection". I've googled what is this and found the following: "XDADevelopers says that the feature appears to “randomise a smartphone’s MAC address so that the actual address is not shared with the WLAN router with a probe frame,” which is basically a request from a smartphone to scan available WiFi networks in the vicinity"
This also can be a sollution, but the problem there is no possible to disable this option. How to switch it off?
Screenshot attached.
3. Just FYI, real device mac/randomized mac can be configured in Wi-Fi saved networks only.
However in case of portable Wi-Fi hotspot (for internet sharing) - there is no such option, always randomized mac.
Screenshot attached.
Pls check on your side and fix if possible.
Pls revert with your comments/sollutions.
Many thanks in advance,
Hi, i have never had issue with this, but for second question, did you try disabling MIUI optimisation? Maybe it will then allow you to disable that option.
Djeloan said:
Hi, i have never had issue with this, but for second question, did you try disabling MIUI optimisation? Maybe it will then allow you to disable that option.
Click to expand...
Click to collapse
Hi. There is no "MIUI optimization" option in the developer settings on Xiaomi 13 (xiaomi.eu rom).
Look at screenshot.

Categories

Resources