Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Android Cellphones Handhelds Networking Security Wireless Networking

Wireless Analysis With Monitor Mode On Android 49

An anonymous reader writes "We are a group of three researches, and in the last few weeks, we have been working on Wi-Fi monitor mode for Android devices, based on Broadcom BCM4329 and BCM4330 chipsets. Currently we have a successful PoC for Nexus One and Samsung Galaxy S 2. We've released all the info in our new blog."
This discussion has been archived. No new comments can be posted.

Wireless Analysis With Monitor Mode On Android

Comments Filter:
  • by AmiMoJo ( 196126 ) on Tuesday September 18, 2012 @10:02AM (#41373783) Homepage Journal

    With modern graphics cards dictionary attacks on WPA2 passwords are realistic. Since everyone carries wifi radios around with them and can gather the necessary data you should probably expect more such attacks on your network in the future.

  • by fuzzyfuzzyfungus ( 1223518 ) on Tuesday September 18, 2012 @10:46AM (#41374201) Journal

    It doesn't help entities that are likely to be targets of directed attacks(either high value institutional targets, who ideally aren't using PSK and are rotating passwords properly, or people with psycho and/or prankster neighbors); but the easiest way to keep people out of your network, for most of us, might actually to be to give them some of what they want.

    APs with multiple radios, or chipsets capable of handling multiple SSIDs with distinct security and routing rules, are increasingly common and cheap. If you broadcast an open SSID(all traffic originating from there QoS tagged as lower priority than traffic from your internal network, naturally) that dumps anybody who connects straight to the internet, no connection to the internal network or router configuration interfaces(through Tor if you are really worried about somebody's warez and/or kiddie porn pointing back to you), that removes the bulk of most people's interest in cracking your network itself...

  • by L4t3r4lu5 ( 1216702 ) on Tuesday September 18, 2012 @10:51AM (#41374249)
    WPA2(AES) is the most secure, as long as your vendor implemented it properly.
  • by Penurious Penguin ( 2687307 ) on Tuesday September 18, 2012 @10:53AM (#41374279) Journal
    It uses the aircrack suite and supports injection. I imagine if people write convenient scripts for this software, it could get pretty popular. I've never owned a smartphone and don't know what their ranges are, but if they are close to a half-height mini-PCI, then this is a pocket sized menace indeed. Throw in the Cloud, rainbow tables, mega dictionaries and so on, and you get action. I have no doubt that many people will use such an application just as a novelty (because they can) -- but others may opt for more. Of course, those who don't use common ESSIDs and use peculiar passwords along with WPA2, they should have nothing to worry about. The rest, however, should definitely start with stronger passwords.

    For example, someone can crack your WEP regardless of your password; but to enter the router where the real fun can begin, they would encounter great difficulty if a strong password and unique user ID were set. Verizon figured this out some time ago [slashdot.org]. A strong password could limit an "attacker" to simply using your network. While stronger passwords are a good idea, it shouldn't be one's only recourse though.
  • by spectrokid ( 660550 ) on Tuesday September 18, 2012 @10:56AM (#41374301) Homepage
    Use AES with a very long random gobbledigook password. Write the password down on the back of your router. from wikipedia:
    Weak password Shared-key WPA remains vulnerable to password cracking attacks if users rely on a weak password or passphrase. To protect against a brute force attack, a truly random passphrase of 13 characters (selected from the set of 95 permitted characters) is probably sufficient.[12] To further protect against intrusion, the network's SSID should not match any entry in the top 1000 SSIDs[13] as downloadable rainbow tables have been pre-generated for them and a multitude of common passwords.

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...