Friday, May 2, 2014

Relatively good level of protection most often began to use WPA2-Personal tmsa with CCMP (AES) encr


Blog Course Schedule Upcoming Events Archive seminars workshops Application Deployment with Microsoft System Center 2012 Configuration Manager Haktivizim: Because they do not like SYSTEM Active Directory Domain Service Role in Windows Server 2012 Unified Remote Access in Windows Server 2012 Hack The Hackers 2012 Forefront Protection for Exchange ITIL v3 2010 2011 Windows Server 2008 R2 Security in the Cloud Unified Desktop tmsa Management & Forefront Endpoint Protection Information Security Fundamentals Botnets for Dummies Introduction to PowerShell Hack The Hackers 2011 Footprinting & Reconnaissance Linux SharePoint 2010 IT Pro SharePoint 2010 Developers Windows 7 Forefront TMG 2010 Worm Attacks Archive My IT career Regulation Awards Evaluation Committee Ranking tmsa FAQ Include All publications and your Certification New Horizons 30 years history Partners Team Nikolay Penev Iliana tmsa Dimitrova Lilia Nikolova Stefan Georgiev Dimitar tmsa Stoev Borislav Dinov Lubomir Mateev tmsa Rumen Dimitrov Vladislav Dekov Violeta Ivanova Elena Ianeva Zornitca Gecheva Jordan Parashkevov Sofia Momchilova Yavor Ivanov References New Horizons in the media Careers Hall Rentals Newsletter Contacts
When we talk about security, not to mention the wireless network. They are all around us, in the office, parks, cafes, home. Thanks to them we manage to quickly and easily tmsa access needed us important information from anywhere and at any time. But have you ever thought what might happen if this information falls into the hands of someone, say, an attacker?
Wireless networks, such as removing the need for pure physical access to the network, you simply are in range. The only defense of our data remains cryptographic algorithm. The first one, used extensively in wireless networks is called WEP. Completely insecure nowadays and superseded by WPA and WPA2 protocols.
Relatively good level of protection most often began to use WPA2-Personal tmsa with CCMP (AES) encryption. Breaking of such a long and complex password (different symbols and font size) would take years of regular computer system. If the password changes every month, it becomes mission impossible.
Several years ago, Wi-Fi Alliance introduced standards WPS (Wi-Fi Protected Setup). It is designed to facilitate the setting and ensure the security of wireless home network. The characteristic tmsa feature is the presence of the 8-digit PIN code, which is unique for each wireless device and may not be changed.
Everything seemed fine, but at the end of December 2011 U.S. researchers found a dangerous vulnerability in the PIN of WPS. Usually to nick of code should be tried tens of millions of combinations, which requires a huge time. Hole in WPS reduces the number of combinations to 11,000.
The problem comes from the design and implementation of the standard. When entering an incorrect code, the system shows the validity of the first and second halves of the code separately. tmsa Last digit of the PIN code acts as a checksum. So the possible combinations are 10 4 + 10 3 = 11 000.
The vulnerability affects all manufacturers of wireless devices. The only way to protect ourselves is to stop completely WPS functionality. Another problem is that not all routers support this. The solution is to update firmware, and the latest version, if there function is not available, you can try and unofficial firmware (eg, dd-wrt, openwrt ...).
Tactical Network Solutions have developed a program tmsa called reaver-wps, in order to show that the attack is possible. In the next few lines I will demonstrate how to use in practice. You will see how easy it can be broken down otherwise unbreakable password. I also want to stress the fact that the penetration of private wireless networks is illegal in Bulgaria!
Demonstration will use Linux distribution Backtrack 5 R2, which is specifically tmsa designed to test the security of computer systems. Program Reaver-1.4 is preinstalled, but if you are using an older version of Backtrack or other distribution, you will need to download and install it. If something does not work when you could be the problem of Wi-Fi will make you. In this case, use the Broadcom 4318. The router is a Linksys E1000, which can not be stopped WPS functionality, as shown in the picture:
All listed networks are vulnerable. Each of them can be broken down for 4 to 10 hours. BSSID-it shows the MAC address of the wireless device that holds the network. We see the channel that is running, and the noise level. WPS Locked shows that WPS-A of a network is locked. Some routers tmsa have a defense, so with so many requests for PIN codes, stop for a few minutes WPS (WPS Lock). This slows down quite a bit attack.
3.'s Time to run Reaver in action. The syntax is very simple. A - b BSSID-ask it of the network test. Use-v, to show us PI

No comments:

Post a Comment