Authored by: OpenSourceFTW on Monday, December 10 2012 @ 12:47 PM EST |
The passphrase is salted with the SSID IIRC, so always change that to something
unique to prevent the use of rainbow tables.
I don't think PJ was knocking WPA2's protection by saying it was bad, just that
it was not as airtight as physical wire is (unless you tap it :P).
---
I voted for Groklaw (Legal Technology Category) in the 2012 ABA Journal Blawg
100. Did you? http://www.abajournal.com/blawg100. Voting ends Dec 21.[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Monday, December 10 2012 @ 01:07 PM EST |
As far as I know some routers (maybe other items too) that have "wireless
protected setup" turned on (and some are even still turned on when you turn
it off) can be made to reveal the password for enabling that WPS, and by having
access to WPS the WPA2 password can be easilly retreaved as well. (that was the
whole purpose of having WPS)
Of course that is a bad design and of course one should not exploit that. But it
would be wise to test your own sys.
For people with an internet connection, the information is probably still
somewhere out there.[ Reply to This | Parent | # ]
|
- WPS - Authored by: Anonymous on Monday, December 10 2012 @ 08:57 PM EST
|
Authored by: Anonymous on Tuesday, December 11 2012 @ 11:39 AM EST |
With the cost of hardware dropping you need to be more vigilant. Gpus are now being used and are pretty
cheap. The linked article talks about a machine that does 350 billion guesses
a second.
Reaver can
capture the keys.
jasager
setup man in the middle attacks.
[ Reply to This | Parent | # ]
|
|