The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    New Attack Cracks Wi-Fi Security in One Minute

    Discussion in 'Notebook News and Reviews' started by Charles P. Jefferies, Aug 27, 2009.

  1. Charles P. Jefferies

    Charles P. Jefferies Lead Moderator Super Moderator

    Reputations:
    22,339
    Messages:
    36,639
    Likes Received:
    5,080
    Trophy Points:
    931

    New Attack Cracks Wi-Fi Security in One Minute

    Scientists in Japan claim they have developed a way to crack WPA Wi-Fi encryption in about one minute. WPA is a common wireless encryption standard used in homes and businesses. The attacks work only on WPA systems that use the TKIP algorthim, not the newer WPA 2 and WPA systems that use AES encrpytion.Wi-Fi certified devices have had to support the WPA 2 standards since 2006.

    Full Story (ComputerWorld.com)

     
    Last edited by a moderator: May 7, 2015
  2. Kamin_Majere

    Kamin_Majere =][= Ordo Hereticus

    Reputations:
    1,522
    Messages:
    2,680
    Likes Received:
    0
    Trophy Points:
    55
    I was reading about this on PCmag earlier today... its insane how fast security protocals are being broken.

    I guess it goes to the old saying "if it can be programmed it can be hacked"

    Well heres to quantum encryption:D
     
  3. Clutch

    Clutch cute and cuddly boys

    Reputations:
    1,053
    Messages:
    2,468
    Likes Received:
    28
    Trophy Points:
    66
    At my router at home it has it where you have to allow ever mac address that goes through it and WEP PSK2 or what ever it is.
     
  4. MidnightSun

    MidnightSun Emodicon

    Reputations:
    6,668
    Messages:
    8,224
    Likes Received:
    231
    Trophy Points:
    231
    Well, I'm currently using WPA2-PSK now, so safe for the moment I guess :rolleyes:
     
  5. Quadzilla

    Quadzilla The eye is watching you

    Reputations:
    7,074
    Messages:
    8,376
    Likes Received:
    94
    Trophy Points:
    216
    Yeah i saw that today as well . Yikes!!! :eek: :eek:
     
  6. Red_Dragon

    Red_Dragon Notebook Nobel Laureate

    Reputations:
    2,017
    Messages:
    7,251
    Likes Received:
    0
    Trophy Points:
    205
    Lol, i was on WPA2 for a long time as well. It seemed to have compatibility problem with EVERYTHING though. So i went back to WPA and everything was fine.

    Wow one minute is insane though :)
     
  7. zfactor

    zfactor Mastershake

    Reputations:
    2,894
    Messages:
    11,134
    Likes Received:
    3
    Trophy Points:
    455
    wpa has always been pretty easy but its taken some time. a dictionary attack etc and few software tools is common practice..wep is well just useless that is a minute job also if even 30 seconds in most cases. looks like this new one is based on a chopchop attack not really new with wep but seems now to work well with wpa..

    but one minute takes it up a notch

    wpa2 right now is the only way to go but there are many already trying to knock that over also
     
  8. catacylsm

    catacylsm Notebook Prophet

    Reputations:
    423
    Messages:
    4,135
    Likes Received:
    1
    Trophy Points:
    106
    Even if the network isnt being broadcast?

    This is scarey right there, im still on wep lol.
     
  9. zfactor

    zfactor Mastershake

    Reputations:
    2,894
    Messages:
    11,134
    Likes Received:
    3
    Trophy Points:
    455
    yup. all you need are the right software tools. backtrack with airmon and a few other things will show you all ssid's even ones not being broadcast not at all hard to find those. and there are many other ways also with various software tools

    i have a neighbor to my office who at first though he was smart after a said you know you are on a unsecured network.. so he went and added wep. i then (he owns a LARGE jewlery store and had a lot of client info in his system (not trying to snoop but they have been freinds for a long while and i was trying to help him with no other intentions in this whole thing) went over and handed him his wep key :D took me maybe 30 seconds with a laptop standing in my office.

    so then he removed his ssid and changed his wep kep. he was very proud of himself. i did the same this time. he was pretty shocked at that point. then he went to wpa (after me urging him to go to wpa2) i also then went over with his wpa key.

    all in all he ended up letting me set him up with the proper wpa2. now he is secure at least for the most part....

    all in all its very easy to do with wep or wpa
     
  10. catacylsm

    catacylsm Notebook Prophet

    Reputations:
    423
    Messages:
    4,135
    Likes Received:
    1
    Trophy Points:
    106
    Hmm, hate it when goons try and break these dam encriptions, mays well just switch back to an ethernet box and have ethernet links all around the house.
     
  11. zfactor

    zfactor Mastershake

    Reputations:
    2,894
    Messages:
    11,134
    Likes Received:
    3
    Trophy Points:
    455
    just use the right setup. use wpa2 and use the mac filtering options etc no nothing is ever 100000% but there are very few normal people who will bother with those types of setups
     
  12. QualitySeeker

    QualitySeeker Notebook Consultant

    Reputations:
    39
    Messages:
    221
    Likes Received:
    0
    Trophy Points:
    30
    WPA2 + changed salt (network name) and everything's good (well, at least pre-computed rainbow tables get useless).

    MAC filtering and hidden SSIDs offer zero protection.
     
  13. zfactor

    zfactor Mastershake

    Reputations:
    2,894
    Messages:
    11,134
    Likes Received:
    3
    Trophy Points:
    455
    agreed mostly hidden ssid does nothing. mac filter is better then nothing..