Guest LilBambi Posted December 13, 2012 Share Posted December 13, 2012 (edited) Routers Using WPS Are Intrinsically Unsafe - WindowsSecrets Simple hacker tools can easily sniff out Wi-Fi passwords from routers that have Wi-Fi Protected Setup enabled — quite possibly yours included. Here’s how to protect your network — and even hack your own router to see whether it’s vulnerable. I always use the Manual Method wherever possible. Disabling WPS might not work as it should As alluded to above, some routers don’t properly disable WPS, even if the router’s configuration menu says otherwise. This is especially true of Cisco/Linksys routers made a few years ago, including the extremely common Linksys WRT54G2 router. Turning off WPS via its menus didn’t do what it was supposed to — WPS remained active. (Note: The most recent generation Cisco/Linksys routers apparently do correctly disable WPS when instructed to do so, and Cisco/Linksys has been issuing firmware updates for its older routers. See the Cisco Knowledge Base article 25154, “WPS vulnerability status update for Linksys devices,” and Cisco document 690, “Wi-Fi Protected Setup PIN brute force vulnerability.”) Another great article by Fred Langa over at WindowsSecrets.com Edited December 13, 2012 by LilBambi Quote Link to comment Share on other sites More sharing options...
securitybreach Posted December 13, 2012 Share Posted December 13, 2012 BTW all wifi encryption can be cracked quite easily by sniffing packets and using simple Linux networking applications (aircrack-ng). Your best bet is to use WPA2/AES, although this can be cracked as well given enough time. Also, make sure you change these default router passwords, otherwise your network will be 0wned if wifi encryption is cracked. Note: Aircrack-ng is supposed to be used to test networks you run or have permission to pen-test 1 Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted December 13, 2012 Share Posted December 13, 2012 So, far yes, all except WPA2 AES. That is not trivial. Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted December 13, 2012 Share Posted December 13, 2012 (edited) The biggest thing is to make a more difficult WPA2 AES Key. It might seem counter-intuitive, but an easy to remember password of TimRouterHouseFatCat17###would take 7.66 hundred million trillion centuries to crack in a massive cracking array scenario. Whereas something seemingly complex like G8sloves$ could possibly be cracked in just under 2 hours. In the quest for more secure passwords, it's easy to make them harder to remember and less secure. Using these tips and tools will hopefully make the opposite true for you. It is the passphrase that is the problem when using WPA2 AES. Edited December 13, 2012 by LilBambi Quote Link to comment Share on other sites More sharing options...
securitybreach Posted December 13, 2012 Share Posted December 13, 2012 Correct, I was just pointing out the WEP and WPA can be easily cracked in under 5 minutes no matter the length of the password. Well I say that but I do not know if it is 100% true for all cases. I just know I have done this with a 15 character password. Granted it was only numbers and letters but still. Quote Link to comment Share on other sites More sharing options...
Guest LilBambi Posted December 13, 2012 Share Posted December 13, 2012 (edited) Good to mention that WPA2 AES (the current implementation is considered to be safe for the most part) unless you foolishly don't change the router admin password, and do not have a decent passphrase for your wifi connections. And notice I say WPA2 AES. That is the more secure and only encryption that is considered safe at this point. Not WPA2 TKIP. That too is vulnerable. Edited December 13, 2012 by LilBambi Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.