FlyerTalk Forums - View Single Post - Safeguarding your personal data transmitted over hotel internet
Old Apr 11, 2013 | 7:01 am
  #30  
gqZJzU4vusf0Z2,$d7
All eyes on you!
10 Years on Site
 
Join Date: Feb 2013
Location: Somewhere In The Five Eyes
Posts: 238
> Do you have a source or paper I can take a look at on
> the WPA2 cracking?

Google: Reaver

Reaver is not a direct crack of WPA/WPA2 itself. Rather; Reaver recovers
WPA/WPA2 keys by cracking the WPS (WiFi Protected Setup) service. The
usual Linux boot/crack ISOs now include Reaver. Brute-forcing the WPS
service takes ~9 hours (for a guaranteed return of the WPA/WPA2 keys.

Sadly; The WiFi Alliance requires that anyone wishing to use the term "WiFi"
or the B&W "WiFi" logo ... MUST implement WPS ... and it MUST be "On" by
default. Ergo; most of the WiFi routers are vulnerable.

Even worse; Linksys routers have a radio-button to disable WPS ... but it
does NOT disable WPS. Good grief.

Last time I checked (~4 months ago), most of the WiFi router vendors had
not updated their firmware to address this vulnerability.

- Apple did a good job of implementing WPS for their Airport family - not vulnerable.
- DD-WRT is not vulnerable (because it does not support WPS)

Another possible workaround that I have not verified ... set the TKIP renegotiation
interval to less than 60 secs.

Last edited by gqZJzU4vusf0Z2,$d7; Apr 11, 2013 at 10:07 am
gqZJzU4vusf0Z2,$d7 is offline