Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.

WPA keys gone in 60 seconds

[es] :: Security :: WPA keys gone in 60 seconds

[ Pregleda: 2570 | Odgovora: 1 ] > FB > Twit

Postavi temu Odgovori

Autor

Pretraga teme: Traži
Markiranje Štampanje RSS

Ivan Dimkovic

Administrator
Član broj: 13
Poruke: 16687
*.dip.t-dialin.net.



+7173 Profil

icon WPA keys gone in 60 seconds28.08.2009. u 14:46 - pre 178 meseci
http://www.theregister.co.uk/2009/08/28/wpa_60sec/

Citat:

Networking nerds claim to have devised a way of breaking Wi-Fi Protected Access (WPA) encryption within 60 seconds.

The technique, developed by Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University, is based on the established Becks-Tews method, which involves making minor changes to packets encrypted with TKIP - Temporal Key Integrity Protocol, a WPA security mechamism - and then sending those packets back to the access point.

However, the Becks-Tews method is known to take anywhere between ten and 15 minutes to execute.

In a recently released paper, Ohigashi and Morii proposed a man-in-the-middle style of attack – also used by the Beck-Tews approach – in which a user’s communication is intercepted by an attacker.

This approach carries a high risk of detection, the pair admitted, so being able to shorten the attack time down to under one minute is a major advantage – to potential hackers, at least.

Ohigashi’s and Morii’s technique doesn’t work in WPA 2 – the AES-based successor to WPA.


Iako je sam novinarski clanak previse tendeciozan, sam napad nije toliko opasan - nije moguce ukrasti kljuceve i zakaciti se kao nezavisni klijent na ruter, recimo - ali je moguce falsifikovati pakete i to u vrlo zabrinjavajuce kratkom roku od 1 minuta, sto opet nije nesto sto je od direktnog interesa likovima "koji bi samo da ukradu net" ali moze posluziti za neke malo komplikovanije poduhvate.

Ali svejedno - WPA2 FTW - podesite vase AP-ove ako vec niste na WPA2, time prelazite na AES enkripciju i za sada nema mogucnosti provale ako koristite dovoljno randomiziran kljuc :-)

Link na sam rad: http://jwis2009.nsysu.edu.tw/l...cation%20Attack%20on%20WPA.pdf

DigiCortex (ex. SpikeFun) - Cortical Neural Network Simulator:
http://www.digicortex.net/node/1 Videos: http://www.digicortex.net/node/17 Gallery: http://www.digicortex.net/node/25
PowerMonkey - Redyce CPU Power Waste and gain performance! - https://github.com/psyq321/PowerMonkey
 
Odgovor na temu

EArthquake

Član broj: 20684
Poruke: 884
*.adsl.eunet.rs.



+67 Profil

icon Re: WPA keys gone in 60 seconds15.10.2009. u 23:02 - pre 176 meseci
naisao sam na interesantan scenario za upotrebu ovog napada

napadac postavi masinu na internetu koja prati prispele pakete

zatim , forge-uje syn paket kroz wifi mrezu na napadanu masinu ,
ali syn paket s adresom one masine na internetu

masina na netu ceka odgovor na syn paket koji nije sama poslala
sredi sekvencne brojeve i dobija otvorenu konekciju s masinom koja se napada

tako dalje moze da lansira standardne exploite
 
Odgovor na temu

[es] :: Security :: WPA keys gone in 60 seconds

[ Pregleda: 2570 | Odgovora: 1 ] > FB > Twit

Postavi temu Odgovori

Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.