Jump to content

Routers Using WPS Are Intrinsically Unsafe


Guest LilBambi

Recommended Posts

Guest LilBambi

Routers Using WPS Are Intrinsically Unsafe - WindowsSecrets

 

 

Simple hacker tools can easily sniff out Wi-Fi passwords from routers that have Wi-Fi Protected Setup enabled — quite possibly yours included.

 

Here’s how to protect your network — and even hack your own router to see whether it’s vulnerable.

 

I always use the Manual Method wherever possible.

 

Disabling WPS might not work as it should

 

As alluded to above, some routers don’t properly disable WPS, even if the router’s configuration menu says otherwise. This is especially true of Cisco/Linksys routers made a few years ago, including the extremely common Linksys WRT54G2 router. Turning off WPS via its menus didn’t do what it was supposed to — WPS remained active.

 

(Note: The most recent generation Cisco/Linksys routers apparently do correctly disable WPS when instructed to do so, and Cisco/Linksys has been issuing firmware updates for its older routers. See the Cisco Knowledge Base article 25154, “WPS vulnerability status update for Linksys devices,” and Cisco document 690, “Wi-Fi Protected Setup PIN brute force vulnerability.”)

 

Another great article by Fred Langa over at WindowsSecrets.com

Edited by LilBambi
Link to comment
Share on other sites

securitybreach

BTW all wifi encryption can be cracked quite easily by sniffing packets and using simple Linux networking applications (aircrack-ng). Your best bet is to use WPA2/AES, although this can be cracked as well given enough time.

 

Also, make sure you change these default router passwords, otherwise your network will be 0wned if wifi encryption is cracked.

 

Note: Aircrack-ng is supposed to be used to test networks you run or have permission to pen-test ;)

  • Like 1
Link to comment
Share on other sites

Guest LilBambi
securitybreach

Correct, I was just pointing out the WEP and WPA can be easily cracked in under 5 minutes no matter the length of the password. Well I say that but I do not know if it is 100% true for all cases. I just know I have done this with a 15 character password. Granted it was only numbers and letters but still.

Link to comment
Share on other sites

Guest LilBambi

Good to mention that WPA2 AES (the current implementation is considered to be safe for the most part) unless you foolishly don't change the router admin password, and do not have a decent passphrase for your wifi connections.

 

And notice I say WPA2 AES. That is the more secure and only encryption that is considered safe at this point. Not WPA2 TKIP. That too is vulnerable.

Edited by LilBambi
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...