[AusNOG] WPA2 Wireless Security Crackable With "Relative Ease"

Greg mclennan at internode.on.net
Mon Mar 24 08:17:43 EST 2014


     I agree Glen. There is nothing new to add to already known flaws in 
the overall system.  Was there a pay per view for this journal/research 
review paper?  Maybe they must found the web site 
"https://www.cloudcracker.com/" and got an idea..

Regards Greg
..
On 23/03/2014 10:52 PM, Glen Turner wrote:
> Could someone explain to me what is new here?
>>
>> In their experiment, they carried out a brute force attack on the 
>> password protecting the WPA2 network and managed to succeed. 
>> According to their findings, the time needed to break into a system 
>> increases the longer the password used.
>>
> The requirement for PSK keys to be long and random to resist brute 
> forcing is well known.
>>
>> The weakest point, the researchers believe, is the de-authentication 
>> step involved in the wireless setup.
>>
>> As part of their security protocols, routers using WPA2 must 
>> reconnect and re-authenticate devices periodically and share a new 
>> key each time. The team points out that the de-authentication step 
>> basically leaves a backdoor unlocked albeit for a limited period. 
>> This period, however, could be long enough for a fast-wireless 
>> scanner and a determined intruder.
>>
> The statement is "researchers believe" not "researchers have proven" 
> or "researchers have demonstrated".
>
> The Abstract is in the modern style, selling the paper rather than 
> explaining what the paper adds to the field.
>
> -glen
>
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140324/ae482906/attachment.html>


More information about the AusNOG mailing list