anuseems Posted March 21, 2014 Share Posted March 21, 2014 (edited) It appears that, besides brute force attacks on WPA2 passwords, another vulnerability has been found:... it is the de-authentication step in the wireless setup that represents a much more accessible entry point for an intruder with the appropriate hacking tools. As part of their purported security protocols routers using WPA2 must reconnect and re-authenticate devices periodically and share a new key each time. The team points out that the de-authentication step essentially leaves a backdoor unlocked albeit temporarily. Temporarily is long enough for a fast-wireless scanner and a determined intruder.http://www.alphagalileo.org/ViewItem.aspx?ItemId=140163&CultureCode=en Edited March 21, 2014 by anuseems Link to comment Share on other sites More sharing options...
lordnsane Posted March 22, 2014 Share Posted March 22, 2014 hmm, how is it different from current deauth attacks which we use in the aircrack suite?aireplay-ng -0 0 -a <bssid> <interface>this one captures the handshake and tries to bruteforce the captured handshake to break the security. Does this new method suggests that we can bypass WPA2 using that temporary window even if we don't know the key and MAC addresses are not filtered? Link to comment Share on other sites More sharing options...
stylemessiah Posted March 22, 2014 Share Posted March 22, 2014 I just boot backtrack and use Reaver to crack the AP via WPS....probably quicker than the brute force dictionary attack Link to comment Share on other sites More sharing options...
nanoman Posted March 22, 2014 Share Posted March 22, 2014 Any Way I Don't USe / Trust WiFi Connection , In Ethernet Cable We Trust :P Link to comment Share on other sites More sharing options...
212eta Posted March 22, 2014 Share Posted March 22, 2014 In Ethernet Cable We Trust .Amen! Link to comment Share on other sites More sharing options...
Cyberboom Posted March 22, 2014 Share Posted March 22, 2014 I just boot backtrack and use Reaver to crack the AP via WPS....probably quicker than the brute force dictionary attackNot all router devices have this WPS vulnerability -_- :rolleyes: Link to comment Share on other sites More sharing options...
Catoja Posted March 22, 2014 Share Posted March 22, 2014 (edited) This article means that each time that the router, reconnects its users, its wide open to attacks. It's called Gkey interval i guess. Its kind of old. One of the advices to config your router, is to push the reconnect to max. The hacker needs to wait a looooooooooooooooooot. Edited March 22, 2014 by Catoja Link to comment Share on other sites More sharing options...
stylemessiah Posted March 23, 2014 Share Posted March 23, 2014 I just boot backtrack and use Reaver to crack the AP via WPS....probably quicker than the brute force dictionary attackNot all router devices have this WPS vulnerability -_- :rolleyes: Well i havent found one made in the last 2 or 3 years that i cant crack :) Heres a tip people, turn off WPS.....its a known back door. Ah i remember the early Wifi days when average joes went out to the electronics store and bought wireless routers where the security wasnt enabled by default! This article means that each time that the router, reconnects its users, its wide open to attacks. It's called Gkey interval i guess. Its kind of old. One of the advices to config your router, is to push the reconnect to max. The hacker needs to wait a looooooooooooooooooot. see above comment...WPS is a known backdoor, because given enough time, unlike brute dictionary forcing (where youre only as good as your dictionary), you WILL hack it. Do NOT use WPS. Sure its "easy" to press a button, but its a bad idea. When in doubt, ethernet, its time to love the blue cable all over again...... Link to comment Share on other sites More sharing options...
Sonar Posted March 23, 2014 Share Posted March 23, 2014 glad I try my best to secure my wifi.wps - I always turn offWPA2 AESmac address for allowed systemsbut reading this topic doesn't seem enough? Link to comment Share on other sites More sharing options...
banned Posted March 25, 2014 Share Posted March 25, 2014 (edited) One of the advices to config your router, is to push the reconnect to max. The hacker needs to wait a looooooooooooooooooot.If I'm not mistaken there was an attack based on long re-keying interval as well. Perhaps allows more time to brute-force, I forget. Edited March 25, 2014 by banned Link to comment Share on other sites More sharing options...
Recommended Posts