WiFi vuln.
Results 1 to 2 of 2

Thread: WiFi vuln.

Hybrid View

  1. #1
    HYBR|D
    Guest

    WiFi vuln.

    Something Interesting i happened upon, figured i'd post about it.

    Disable WPS if you can, guys.

    Strictly speaking, the vulnerability lies within the "WPS – PIN" part of the WPS specification.. but since this is the section of WPS that allows connections WITHOUT physical intervention at the access point itself (in the form of pressing a button) - it's more than just theoretical.

    HERE - via Slashdot..

    "When the PIN authentication fails the access point will send an EAP-NACK message back to the client. The EAP-NACK messages are sent in a way that an attacker is able to determine if the first half of the PIN is correct. Also, the last digit of the PIN is known because it is a checksum for the PIN. This design greatly reduces the number of attempts needed to brute force the PIN. The number of attempts goes from 108 to 104 + 103 which is 11,000 attempts in total,"
    Last edited by HYBR|D; December 30th, 2011 at 12:42 PM.

  2. #2
    HYBR|D
    Guest
    Further reading

    Yesterday, Stefan over at .braindump released a white paper detailing vulnerabilities in the WiFi Protected Setup (WPS) protocol that allows attackers to recover WPA/WPA2 passphrases in a matter of hours.

    This is a capability that we at TNS have been testing, perfecting and using for nearly a year. But now that this vulnerability has been discussed publicly we have decided to announce and release Reaver, our WPS attack tool, to the open source community. Reaver is capable of breaking WPS pins and recovering the plain text WPA/WPA2 passphrase of the target access point in approximately 4-10 hours (attack time varies based on the access point).
    While we have released Reaver as an open source project, we also offer a commercial version with additional features and functionality as well as a support plan. Since nearly all access points manufactured in the past few years have WPS support enabled by default, attacking WPS provides several advantages over attacking WPA directly:


    1. Cracking the WPS pin is, obviously, much faster.
    2. Once you have the WPS pin you can instantly recover the WPA passphrase, even if the owner changes the passphrase.
    3. Access points with multiple radios (2.4/5GHz) can be configured with multiple WPA keys. Since the radios use the same WPS pin, knowledge of the pin allows an attacker to recover all WPA keys.


    Of course the disadvantage is that WPS can be disabled. However, in our experience even security experts with otherwise secure configurations neglect to disable WPS; further, some access points don't provide an option to disable WPS, or don't actually disable WPS when the owner tells it to.
    To learn more about Reaver, visit our product page, or the open source project on Googlecode.


    Taken from HERE

Similar Threads

  1. Wifi Cracking.
    By ByTeWrangler in forum Wireless Security
    Replies: 11
    Last Post: August 23rd, 2009, 09:30 PM
  2. Wifi hacking tutorial (insert here)
    By Modderfokker in forum AntiOnline's General Chit Chat
    Replies: 4
    Last Post: January 5th, 2004, 11:12 PM
  3. WiFi Speed Spray - Faster Data Transfer
    By sumdumguy in forum Tech Humor
    Replies: 1
    Last Post: October 18th, 2003, 03:30 AM
  4. Unicode Vuln, How Its Hacked, How Its Used, How To See and FIX
    By sectac in forum The Security Tutorials Forum
    Replies: 1
    Last Post: May 25th, 2003, 02:13 PM
  5. HHTP Decoding On WiFi
    By alanmott in forum Network Security Discussions
    Replies: 4
    Last Post: April 30th, 2003, 01:54 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides