MMM
Page 1 of 2 12 LastLast
Results 1 to 25 of 32

Thread: WPA - Gone in Sixty Seconds

  1. #1
    I am Xtreme
    Join Date
    Dec 2008
    Location
    France
    Posts
    9,060

    WPA - Gone in Sixty Seconds

    Source: http://www.pcadvisor.co.uk/
    Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute.

    The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed by Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University, who plan to discuss further details at a technical conference set for September 25 in Hiroshima.

    Last November, security researchers first showed how WPA could be broken, but the Japanese researchers have taken the attack to a new level, according to Dragos Ruiu, organiser of the PacSec security conference where the first WPA hack was demonstrated. "They took this stuff which was fairly theoretical and they've made it much more practical," he said.

    They Japanese researchers discuss their attack in a paper presented at the Joint Workshop on Information Security, held in Kaohsiung, Taiwan earlier this month.

    The earlier attack, developed by researchers Martin Beck and Erik Tews, worked on a smaller range of WPA devices and took between 12 and 15 minutes to work. Both attacks work only on WPA systems that use the Temporal Key Integrity Protocol (TKIP) algorithm. They do not work on newer WPA 2 devices or on WPA systems that use the stronger Advanced Encryption Standard (AES) algorithm.

    The encryption systems used by wireless routers have a long history of security problems. The Wired Equivalent Privacy (WEP) system, introduced in 1997, was cracked just a few years later and is now considered to be completely insecure by security experts.

    WPA with TKIP "was developed as kind of an interim encryption method as Wi-Fi security was evolving several years ago", said Kelly Davis-Felner, marketing director with the Wi-Fi Alliance, the industry group that certifies Wi-Fi devices. People should now use WPA 2, she said.

    Wi-Fi-certified products have had to support WPA 2 since March 2006. "There's certainly a decent amount of WPA with TKIP out in the installed base today, but a better alternative has been out for a long time," Davis-Felner said.

    Enterprise Wi-Fi networks typically include security software that would detect the type of man-in-the-middle attack described by the Japanese researchers, said Robert Graham, CEO of Errata Security. But the development of the first really practical attack against WPA should give people a reason to dump WPA with TKIP, he said. "It's not as bad as WEP, but it's also certainly bad."

    Users can change from TKIP to AES encryption using the administrative interface on many WPA routers.
    Donate to XS forums
    Quote Originally Posted by jayhall0315 View Post
    If you are really extreme, you never let informed facts or the scientific method hold you back from your journey to the wrong answer.

  2. #2
    Xtreme Addict
    Join Date
    Jan 2006
    Posts
    1,321
    wpa 2 with a 64 bit key ftw. Of course, I do get some odd looks from friends that try to use my wireless when they're over, haha.
    Core i7 920 3849B028 4.2ghz cooled by ek hf | 6gb stt ddr3 2100 | MSI HD6950 cf cooled by ek fc | Evga x58 e760 Classified | 120gb G.Skill Phoenix Pro | Modded Rocketfish case + 1200w toughpower | mcp 655 pump + mcr 320 + black ice pro II

  3. #3
    Xtreme Addict
    Join Date
    May 2004
    Posts
    1,821
    Wireless type communication will always be prone to hacking. If man can secure it, man can break it. Though I have been using WPA2 for quite some time.
    Desktop:
    Antec 300
    Foxcon A7AD-S 790GX
    8GB Gskill PC-1066@5/5/5/12
    PII X940 BE @3.6GHZ
    Sunbeam Core Contact
    2x 640GB in Raid 0+1
    4870 512MB@800/1000
    Vista Business 64bit W/ SP1

  4. #4
    Xtreme Member
    Join Date
    Feb 2008
    Location
    enteon@jabber.ccc.de
    Posts
    292
    old news ^^
    and only applicable under certain non-native circumstances.

    Quote Originally Posted by cky2k6 View Post
    wpa 2 with a 64 bit key ftw. Of course, I do get some odd looks from friends that try to use my wireless when they're over, haha.
    yep, AES ftw ^^
    but isn't a brute force attack very impractical? therefore i guess my short key is very much enough. much much safer than my 30-year-old front door preventing virtually nobody from really breaking into my network
    Last edited by enteon; 08-29-2009 at 12:10 PM.

  5. #5
    Xtreme Enthusiast
    Join Date
    Nov 2006
    Posts
    799
    Two words. MAC Filtering.

    Probably everyone here has:
    SSID off
    WPA2-PSK
    Greater than 8 character password
    Letters, numbers, and characters
    MAC filtering

    Eff ur WPA. Anyone still running it deserves to get hacked.

  6. #6
    I am Xtreme zanzabar's Avatar
    Join Date
    Jul 2007
    Location
    SF bay area, CA
    Posts
    15,871
    Quote Originally Posted by WangChung View Post
    Two words. MAC Filtering.

    Probably everyone here has:
    SSID off
    WPA2-PSK
    Greater than 8 character password
    Letters, numbers, and characters
    MAC filtering

    Eff ur WPA. Anyone still running it deserves to get hacked.
    not all devices work with wpa2 and this is only for tkip not for aes, i dont think that u understand anything on security unless u have an enterprises setup with a polymorphic key u wont keep people off of a wireless network, u can spoof macs to connect even if u have filtering and if u have a hidden ssd there are ways to pick it up for connecting devices.
    Last edited by zanzabar; 08-29-2009 at 04:01 PM.
    5930k, R5E, samsung 8GBx4 d-die, vega 56, wd gold 8TB, wd 4TB red, 2TB raid1 wd blue 5400
    samsung 840 evo 500GB, HP EX 1TB NVME , CM690II, swiftech h220, corsair 750hxi

  7. #7
    I am Xtreme
    Join Date
    Jul 2007
    Location
    Austria
    Posts
    5,485
    I wonder who uses WPA anyway nowadays... my wireless router from 2005 already had WPA2...

  8. #8
    Xtreme Addict
    Join Date
    Aug 2005
    Location
    Germany
    Posts
    2,247
    Quote Originally Posted by Hornet331 View Post
    I wonder who uses WPA anyway nowadays... my wireless router from 2005 already had WPA2...
    we're still on wep here as we got some old devices in use that simply aren't compatible with anything better. legacy for the lose... oh well.
    1. Asus P5Q-E / Intel Core 2 Quad Q9550 @~3612 MHz (8,5x425) / 2x2GB OCZ Platinum XTC (PC2-8000U, CL5) / EVGA GeForce GTX 570 / Crucial M4 128GB, WD Caviar Blue 640GB, WD Caviar SE16 320GB, WD Caviar SE 160GB / be quiet! Dark Power Pro P7 550W / Thermaltake Tsunami VA3000BWA / LG L227WT / Teufel Concept E Magnum 5.1 // SysProfile


    2. Asus A8N-SLI / AMD Athlon 64 4000+ @~2640 MHz (12x220) / 1024 MB Corsair CMX TwinX 3200C2, 2.5-3-3-6 1T / Club3D GeForce 7800GT @463/1120 MHz / Crucial M4 64GB, Hitachi Deskstar 40GB / be quiet! Blackline P5 470W

  9. #9
    I am Xtreme
    Join Date
    Jan 2006
    Location
    Australia! :)
    Posts
    6,096
    Quote Originally Posted by WangChung View Post
    Two words. MAC Filtering.
    2 words: MAC spoofing
    DNA = Design Not Accident
    DNA = Darwin Not Accurate

    heatware / ebay
    HARDWARE I only own Xeons, Extreme Editions & Lian Li's
    https://prism-break.org/

  10. #10
    c[_]
    Join Date
    Nov 2002
    Location
    Alberta, Canada
    Posts
    18,728
    Quote Originally Posted by tiro_uspsss View Post
    2 words: MAC spoofing
    All great and wonderful if you can find the MAC address efficiently I guess.

    All along the watchtower the watchmen watch the eternal return.

  11. #11
    Xtreme CCIE
    Join Date
    Dec 2004
    Location
    Atlanta, GA
    Posts
    3,842
    WPA is NOT cracked

    ^ I want to emphasize that because people may get the wrong impression from this snippit.

    This is a very specialized attack, and it does not open the gates to full sniffing. This particular attack can work in small, specific circumstances and allow an attacker to get the key for a cipher stream only - one of the numerous, ever-changing streams that will be in use. It does not compromise the full passphraise key in any way/shape/form.

    I am not saying that WPA is as secure as WPA2 - nowhere near (WPA2 is completely uncrackable ATM, minus brute force) - but it's still not bad at all.


    Quote Originally Posted by WangChung View Post
    Two words. MAC Filtering.

    Probably everyone here has:
    SSID off
    WPA2-PSK
    Greater than 8 character password
    Letters, numbers, and characters
    MAC filtering

    Eff ur WPA. Anyone still running it deserves to get hacked.
    If you have WPA2 and a solid passPHRAISE (not passWORD), then the SSID and MAC filtering are just inconveniences to you.

    If you are using WPA, same applies.

    If you have WEP, nothing will save you. I have a bunch of hidden ESSID networks around me - a funny fact is that any credible network scanner picks those up too (displaying "SSID: <hidden>").
    Last edited by Serra; 08-29-2009 at 10:52 PM. Reason: Typo removal
    Dual CCIE (Route\Switch and Security) at your disposal. Have a Cisco-related or other network question? My PM box is always open.

    Xtreme Network:
    - Cisco 3560X-24P PoE Switch
    - Cisco ASA 5505 Firewall
    - Cisco 4402 Wireless LAN Controller
    - Cisco 3502i Access Point

  12. #12
    Xtreme Cruncher
    Join Date
    Nov 2005
    Location
    Rhode Island
    Posts
    2,740
    Two best ways to not get hacked:

    1. Live in the middle of the woods away from any local road or houses.
    2. Use a wired network.

    I use both.
    Fold for XS!
    You know you want to

  13. #13
    Xtreme Member
    Join Date
    Jul 2007
    Posts
    174
    Quote Originally Posted by [XC] Lead Head View Post
    Two best ways to not get hacked:

    1. Live in the middle of the woods away from any local road or houses.
    2. Use a wired network.

    I use both.
    Or just live near a bunch of idiots that all have the default unsecured router settings

  14. #14
    Xtreme Enthusiast
    Join Date
    Feb 2007
    Location
    So near, yet so far.
    Posts
    737
    Quote Originally Posted by vengance_01 View Post
    Wireless type communication will always be prone to hacking. If man can secure it, man can break it. Though I have been using WPA2 for quite some time.

    Specially on older algo. of course.
    Newer ones are secure until a crack is found, so its algo. after algo.
    "Uncrackable" is a "for now" statement.
    [[Daily R!G]]
    Core i7 920 D0 @ 4.0GHz w/ 1.325 vcore.
    Rampage II Gene||CM HAF 932||HX850||MSI GTX 660ti PE OC||Corsair H50||G.Skill Phoenix 3 240GB||G.Skill NQ 6x2GB||Samsung 2333SW

    flickr

  15. #15
    Moderator
    Join Date
    Mar 2006
    Posts
    8,556
    Quote Originally Posted by STEvil View Post
    All great and wonderful if you can find the MAC address efficiently I guess.
    Sure is... sniff the MAC address of an already connected device. Then kick it off and then you join. Then again.... if you have it cracked and can sniff the packets... in a lot of cases you won't need direct access. All depends on what you want.

  16. #16
    Administrator
    Join Date
    Nov 2007
    Location
    Stockton, CA
    Posts
    3,569
    Quote Originally Posted by ecidious View Post
    Or just live near a bunch of idiots that all have the default unsecured router settings
    True

    But you guys act like everyone should know this stuff, when most of the people cant understand why they keep getting popups.

    Many who are just simply compuer users know nothing about any of this and have just picked up a kit from Bestbuy that setups a comcast cable box and a wireless router and think they are all set to go.

    Oh yeah why does my anti virus program keep popping up this box in the lower right conner of my screen that is a red and says funny stuff.

    Then why should any of these home users even care about all this. Its not like thier surfing habits are far worse then even having WEP or anything else set on thier router.

    This stuff should be plug and play and auto config for it to be of any real use to the avgerage user.

    Not like they have anything to steal anyway on thier comp, besides free use of thier wireless. Virus that they have no clue about do far more harm.

    I only have 5 routers showing up on my wireless connection screen and I can bet they have no clue about any of this.

  17. #17
    Xtreme Addict
    Join Date
    Sep 2008
    Location
    Downunder
    Posts
    1,313
    WPA 2 AES with a 63 random character passphrase here. I hide the SSID but don't do MAC filtering. A hidden SSID is hardly an inconvenience. The best way to break my network is to steal my USB flash drive. I put a copy of the passphrase on it because I can't possibly hope to remember it

  18. #18
    Registered User
    Join Date
    Nov 2002
    Location
    The 909
    Posts
    258
    Right, the MAC addresses are not encrypted and easy to obtain and/or spoof. However, having a valid MAC is only needed if you want to connect to the network. It is unnecessary if you are just interested in decrypting the data.

    Disabling SSID broadcasts doesn't stop someone from identifying your network, sniffing the data from your network, and trying to crack the key. It's only required if someone wants to connect to the network; in this case, there are other packets that include the SSID. A long and complex passphrase/password is definitely a must as computers and key cracking tools are getting faster and faster.

  19. #19
    Xtreme Member
    Join Date
    Apr 2006
    Location
    Central California
    Posts
    359
    Reminds me of my friend whom, whenever he sees unsecured networks, changes the network name to "igothackedlol."

  20. #20
    L-l-look at you, hacker.
    Join Date
    Jun 2007
    Location
    Perth, Western Australia
    Posts
    4,644
    Heh. WPA2 with AES for years here. However, I must admit that I do run WEP from time to time, mainly when I'm feeling nostalgic and want to bust out some Nintendo DS multiplayer - damn thing only supports weak WEP at that - but there's never anything on that network other than the DS and a net connection, and it's only up for a few hours.
    Rig specs
    CPU: i7 5960X Mobo: Asus X99 Deluxe RAM: 4x4GB G.Skill DDR4-2400 CAS-15 VGA: 2x eVGA GTX680 Superclock PSU: Corsair AX1200

    Foundational Falsehoods of Creationism



  21. #21
    Xtreme Enthusiast
    Join Date
    Mar 2008
    Location
    Alberta Canada
    Posts
    631
    Quote Originally Posted by Serra View Post
    WPA is NOT cracked
    If you have WEP, nothing will save you. I have a bunch of hidden ESSID networks around me - a funny fact is that any credible network scanner picks those up too (displaying "SSID: <hidden>").
    even the intel wireless network scanner can pick up on non broadcasting SSIDs..I know one time I had to do some re-working of something my mom wanted to print off at costco...picked up like..15 non broadcasting SSIDs
    Current System:
    eVGA 680i SLi "A2" P30 BIOS
    intel Core 2 Quad Q6600 (currently at stock)
    OCZ ReaperX 4GB DDR2 1000 (running at DDR2 800 Speeds with cas4)
    320GB Seagate 7200.10
    XFX 8800GT XXX 512MB (stock clocks)
    auzentech X-Fi Prelude
    PC Power and Cooling Silencer 750 Quad Copper
    Win XP Pro

  22. #22
    Xtreme Addict
    Join Date
    Sep 2008
    Location
    Downunder
    Posts
    1,313
    My Realtek-based WiFi card picks up hidden SSIDs and just lists them as Other.

  23. #23
    PIfection
    Join Date
    May 2006
    Posts
    989
    its only a matter of time until wpa2 is totally compromised like wep...

    if you want a proper wireless security standard please consider EAP-TLS... certificate authentication is always going to be harder to crack than password based

  24. #24
    Xtreme Cruncher
    Join Date
    Jul 2003
    Location
    Finland, Eura
    Posts
    1,744
    Yep, all encryption systems will fall.


    http://mato78.com - Finnish PC Hardware news & reviews
    BulldogPO @ Twitter


  25. #25
    Xtreme Enthusiast
    Join Date
    Apr 2008
    Location
    Anti-SoapBoxVille
    Posts
    744
    Quote Originally Posted by Hornet331 View Post
    I wonder who uses WPA anyway nowadays... my wireless router from 2005 already had WPA2...
    I do but I don't recall why. Something I have/had on my network didn't support wpa2 for some reason.

Page 1 of 2 12 LastLast

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •