Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Networking Wireless Networking

A New Wi-Fi Exploit, Limited But Clever 77

eggboard writes "Martin Beck, who in 2008 co-wrote a paper describing a way to inject packets into a secured Wi-Fi system, is back with a more extensive exploit. His 'Enhanced TKIP Michael Attacks' still don't allow extraction of a key, and are limited to TKIP (not AES-CCMP) WPA-protected networks. Still, he's figured out how to put in large payloads, and to extract data sent from an access point to a client — all without cracking the network key. The attack requires proximity to sniff and inject data, but it's another crack in the older key standard (TKIP) that no one with serious security interests should still be using." Here is Beck's paper (PDF) describing the new attacks.
This discussion has been archived. No new comments can be posted.

A New Wi-Fi Exploit, Limited But Clever

Comments Filter:
  • SSID (Score:3, Interesting)

    by getNewNickName ( 980625 ) on Saturday February 27, 2010 @04:50PM (#31299534)
    Re: wi-fi security, what's to stop someone from creating a hotspot with the same SSID and just wait for the user to provide their credentials when they try to re-login? The average user will probably just go ahead and re-enter their password. No need for breaking any encryption, just a bit of social engineering.
  • Re:Very Limited (Score:3, Interesting)

    by eggboard ( 315140 ) on Saturday February 27, 2010 @05:21PM (#31299728) Homepage

    That's not as limited as it sounds. There are perhaps hundreds of millions of routers running versions of embedded Linux, and WMM/802.11e may be enabled by default on many of those!

  • Re:TKIP and CCMP (Score:5, Interesting)

    by eggboard ( 315140 ) on Saturday February 27, 2010 @05:52PM (#31299900) Homepage

    That comment is halfway between troll and truth.

    That only works for short passwords using dictionary words and common alternatives--typically eight characters or fewer. Yes, you can get precomputed dictionaries for common SSIDs, and you can even use a new service to do some computation.

    However, move to 9 characters of random text (&fa^g_!80) and a unique SSID ("My little pony's network"), and all bets are off to computing the result in anything like a usable period of time.

    TKIP and AES-CCMP remain strong for long, strong passwords, long being 10 or more characters, but 12 to 20 is best.

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...