Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Wireless Networking Encryption Security IT

WPA2 Wireless Security Crackable WIth "Relative Ease" 150

An anonymous reader writes "Achilleas Tsitroulis of Brunel University, UK, Dimitris Lampoudis of the University of Macedonia, Greece and Emmanuel Tsekleves of Lancaster University, UK, have investigated the vulnerabilities in WPA2 and present its weakness. They say that this wireless security system might now be breached with relative ease [original, paywalled paper] by a malicious attack on a network. They suggest that it is now a matter of urgency that security experts and programmers work together to remove the vulnerabilities in WPA2 in order to bolster its security or to develop alternative protocols to keep our wireless networks safe from hackers and malware."
This discussion has been archived. No new comments can be posted.

WPA2 Wireless Security Crackable WIth "Relative Ease"

Comments Filter:
  • Re:Expected (Score:5, Informative)

    by skids ( 119237 ) on Friday March 21, 2014 @11:12PM (#46548857) Homepage

    Once quantum computing fully arrives, I guess encryption will be mostly moot.

    Bad guess [wikipedia.org]

  • by Anonymous Coward on Saturday March 22, 2014 @07:09AM (#46550231)

    It's called 802.11w and introduces encryption on management frames (so de-auth attack is out), this problem is solved. It's up to vendors/developers to implement it.

  • by Anonymous Coward on Saturday March 22, 2014 @07:47AM (#46550325)

    Nobody knows what they did, because their paper is paywalled. From afar, it looks like the a compilation of standard attack methods. The WLAN standard uses unencrypted deauthentication packets, which enables an attacker to kick anyone from the network without knowing the network's encryption key. This can be used in a denial-of-service fashion, where the attacker continously deauths everyone, so that nobody can use the network. Or it can be used once on the victim: The victim will automatically reconnect to the network, which gives the attacker an opportunity to capture the handshake which includes the key negotiation. The attacker can then use this recording to perform an offline brute force attack to find the key. If the attacker guesses the key, he's in.

    Without using deauth, the attacker would just have to wait until the victim connects to the network on its own. That's not going to stop a determined attacker, i.e. one who attempts a brute force attack on WPA-PSK.

    Long story short: If that's it (I don't see any hint that it's not), then a sufficiently random pre-shared-key prevents a successful attack.

  • by craighansen ( 744648 ) on Saturday March 22, 2014 @11:55AM (#46551557) Journal

    TFAbstract says that WPA2 can be cracked with brute force search, and that long passwords are more secure than short ones. Looking up the home pages of these internationally renowned researchers http://www.brunel.ac.uk/bbs/pe... [brunel.ac.uk] http://issel.ee.auth.gr/people... [ee.auth.gr] http://www.research.lancs.ac.u... [lancs.ac.uk] reveals that these three claim no other security-focused publications. But perhaps I'm too quick to judge. Somebody pay the man and read their paper. Or is this the two-step get-rich-quick scheme?: - (1) Publish Paywalled Article Exposing Security Holes in Commonly-Used Security Protocol (2) Profit! (PPAESHiCUSP-P)

Adding features does not necessarily increase functionality -- it just makes the manuals thicker.