Jump to content

WPA2 Security Cracked


anuseems

Recommended Posts

It appears that, besides brute force attacks on WPA2 passwords, another vulnerability has been found:

... it is the de-authentication step in the wireless setup that represents a much more accessible entry point for an intruder with the appropriate hacking tools. As part of their purported security protocols routers using WPA2 must reconnect and re-authenticate devices periodically and share a new key each time. The team points out that the de-authentication step essentially leaves a backdoor unlocked albeit temporarily. Temporarily is long enough for a fast-wireless scanner and a determined intruder.

http://www.alphagalileo.org/ViewItem.aspx?ItemId=140163&CultureCode=en

Edited by anuseems
Link to comment
Share on other sites


  • Replies 9
  • Views 2.4k
  • Created
  • Last Reply

Top Posters In This Topic

  • stylemessiah

    2

  • anuseems

    1

  • lordnsane

    1

  • nanoman

    1

hmm, how is it different from current deauth attacks which we use in the aircrack suite?

aireplay-ng -0 0 -a <bssid> <interface>

this one captures the handshake and tries to bruteforce the captured handshake to break the security. Does this new method suggests that we can bypass WPA2 using that temporary window even if we don't know the key and MAC addresses are not filtered?

Link to comment
Share on other sites


stylemessiah

I just boot backtrack and use Reaver to crack the AP via WPS....probably quicker than the brute force dictionary attack

Link to comment
Share on other sites


I just boot backtrack and use Reaver to crack the AP via WPS....probably quicker than the brute force dictionary attack

Not all router devices have this WPS vulnerability -_- :rolleyes:

Link to comment
Share on other sites


This article means that each time that the router, reconnects its users, its wide open to attacks. It's called Gkey interval i guess. Its kind of old. One of the advices to config your router, is to push the reconnect to max. The hacker needs to wait a looooooooooooooooooot.

Edited by Catoja
Link to comment
Share on other sites


stylemessiah

I just boot backtrack and use Reaver to crack the AP via WPS....probably quicker than the brute force dictionary attack

Not all router devices have this WPS vulnerability -_- :rolleyes:

Well i havent found one made in the last 2 or 3 years that i cant crack :)

Heres a tip people, turn off WPS.....its a known back door.

Ah i remember the early Wifi days when average joes went out to the electronics store and bought wireless routers where the security wasnt enabled by default!

This article means that each time that the router, reconnects its users, its wide open to attacks. It's called Gkey interval i guess. Its kind of old. One of the advices to config your router, is to push the reconnect to max. The hacker needs to wait a looooooooooooooooooot.

see above comment...WPS is a known backdoor, because given enough time, unlike brute dictionary forcing (where youre only as good as your dictionary), you WILL hack it. Do NOT use WPS. Sure its "easy" to press a button, but its a bad idea.

When in doubt, ethernet, its time to love the blue cable all over again......

Link to comment
Share on other sites


glad I try my best to secure my wifi.

wps - I always turn off

WPA2 AES

mac address for allowed systems

but reading this topic doesn't seem enough?

Link to comment
Share on other sites


One of the advices to config your router, is to push the reconnect to max. The hacker needs to wait a looooooooooooooooooot.

If I'm not mistaken there was an attack based on long re-keying interval as well. Perhaps allows more time to brute-force, I forget.

Edited by banned
Link to comment
Share on other sites


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...