By Charlie Osborne for Zero Day | August 8, 2018
The attack technique can be used to compromise WPA/WPA2-secured routers and crack Wi-Fi passwords which have Pairwise Master Key Identifiers (PMKID) features enabled.
...the new technique is performed on the Robust Security Network Information Element (RSN IE) of a single EAPOL frame.
...The attack is clientless and does not require regular users to be involved at any stage. Information gathered is translated in regular hex encoded strings, which means that no special translation or output formats will thwart attackers or cause delays.
..."At this time, we do not know for which vendors or for how many routers this technique will work, but we think it will work against all 802.11i/p/q/r networks with roaming functions enabled (most modern routers),"
New Wi-Fi attack cracks WPA2 passwords with ease
New Wi-Fi attack cracks WPA2 passwords with ease
New Wi-Fi attack cracks WPA2 passwords with ease
After reading the article WPA-3 is still using older encryption technology (TLS with FS) The new standard TLS1.3 should be used, albeit with 192bit for user and enterprise.
MHO: I don't trust 128bit anything encrypted. /mho
Regards
8Geee
MHO: I don't trust 128bit anything encrypted. /mho
Regards
8Geee
Linux user #498913 "Some people need to reimagine their thinking."
"Zuckerberg: a large city inhabited by mentally challenged people."
"Zuckerberg: a large city inhabited by mentally challenged people."