Wi-Fi router vulnerabilities can leave you wide open to hackers

TECHi's Author
Opposing Author Arstechnica Read Source Article
Last Updated
TECHi's Take
Rocco Penn
Rocco Penn
  • Words 90
  • Estimated Read 1 min

Typically, attacks against your WiFi router require a lengthy attempt to guess any codes and passwords. Not if you use 0xcite’s new technique, however; the research firm has detailed a flaw in some router chipsets that lets hackers bypass the push-button security of WiFi Protected Setup almost instantly. Instead of trying to guess a hotspot’s PIN code, which can take hours, you simply take a single shot based on a series of offline calculations. Once you’re ready to attack, it takes roughly “one second” to get in.

Arstechnica

Arstechnica

  • Words 146
  • Estimated Read 1 min
Read Article

A researcher has refined an attack on wireless routers with poorly implemented versions of the Wi-Fi Protected Setup that allows someone to quickly gain access to a router’s network. The attack exploits weak randomization, or the lack of randomization, in a key used to authenticate hardware PINs on some implementations of Wi-Fi Protected Setup, allowing anyone to quickly collect enough information to guess the PIN using offline calculations. By calculating the correct PIN, rather than attempting to brute-force guess the numerical password, the new attack circumvents defenses instituted by companies. While previous attacks require up to 11,000 guesses—a relatively small number—and approximately four hours to find the correct PIN to access the router’s WPS functionality, the new attack only requires a single guess and a series of offline calculations, according to Dominique Bongard, reverse engineer and founder of 0xcite, a Swiss security firm.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Arstechnica

The FCC has approved America’s strongest-ever net neutrality rules
The FCC has approved America’s strongest-ever net neutrality rules

The strongest net neutrality rules that the United States has ever seen were approved by the FCC in a highly-anticipated…

Yahoo argues about crypto backdoors with the NSA
Yahoo argues about crypto backdoors with the NSA

It's been almost a year and a half since it was revealed that the NSA installed backdoors into several common cryptography…

The founder of 4chan has decided to leave the website
The founder of 4chan has decided to leave the website

Regardless of how you feel about 4chan, you can't deny how important the website has been in making the internet what…

T-Mobile introduces a brilliant new data rollover program
T-Mobile introduces a brilliant new data rollover program

T-Mobile may be an “Un-carrier” but it’s not a charity, it’s here to make money. So while its new Data Stash…