WPA/WPA2 Cracking With CPUs, GPUs, and the Cloud 106
wintertargeter writes "Yeah, it's another article on security, but this time we finally get a complete picture. Tom's Hardware looks at WPA/WPA2 brute-force cracking with CPUs, GPUs, and Amazon's Nvidia Tesla-based EC2 cloud servers. Verdict? WPA/WPA2 is pretty damn secure. Now to wait for a side-channel attack. Sigh...."
The Only Solution (Score:5, Insightful)
Ultimately the only solution is to have a segregated WiFi network. I've set one up in one of our offices, with the others to follow soon. If one our workers needs to access internal network resources from our WiFi network, he's got to do what he'd do if he was in a coffee shop or an airport, establish a VPN connection to the internal network. There simply isn't any other solution so far as I can tell. You have to treat WiFi as a potentially hostile entry point.
Re:The Only Solution (Score:5, Insightful)
Anyone with a set of overalls a handtruck/cart and a cardboard box can get into pretty much any office.
Re:brute farce (Score:4, Insightful)
That's why we use WPA2/AES.
Re:The Only Solution (Score:5, Insightful)
Who's fault it is isn't relevant. If you're concerned with fault, you must be a manager rather than something useful. The goal is to keep things private and secure, not make sure you get to point the finger somewhere else. If you're pointing the finger, you've already failed even if you're too stupid to realize it.