Popular Posts
-
Neverwinter is a standalone game and not part of the previous Neverwinter Nights series. The game is scheduled to run closed beta testin...
-
We are currently uploading some Starcraft 2 videos! So go check them out on our Youtube channel http://www.youtube.com/user/Gamincs and co...
-
The FBI swooped on Higinio O Ochoa III after he posted the snap, which included a gloating message to his online victims.He took the pictur...
Blog Archive
-
▼
2012
(70)
-
▼
May
(27)
- Soon the whole world will be hacked!
- End of Nations
- BLR
- Gas Guzzlers!
- Alan Wake's American Nightmare
- Ghost Recon: Future Soldier
- GamincsFPS
- Ferrari Racing Legends
- Ready for some racing?
- Hitman Absolution
- UEFA Euro 2012!
- Max Payne 3
- League of Legends
- Diablo III features
- Apple iPad Overview
- Windows 8 features
- Resident Evil Raccoon City
- Let the battle begin!
- Nexuiz takes action to the arenas!
- Starhawk for PS3
- GeForce GTX 690
- Minecraft for Xbox 360
- Mafia II Tweak Guide
- A new MMO! Just little bit different!
- Sniper Elite V2
- HomeOS by Microsoft!
- Your router may have a backdoor!
-
▼
May
(27)
Tuesday, May 1, 2012

Last year it was exposed that the WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack. A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct.
The lack of a proper lock out policy after a certain number of failed attempts to guess the PIN on many wireless routers makes this brute force attack that much more feasible.
Some 100,000 routers of type Speedport W921V, W504V and W723V are affected in Germany alone. What makes things worse is the fact that in order to exploit the backdoor, no button has to be pushed on the device itself and on some of the affected routers, the backdoor PIN ("12345670") is still working even after WPS has been disabled by the user. The only currently known remedy for those models is to disable Wi-Fi altogether. Since all Arcadyan routers share the same software platform, more models might be affected.
Last year, Tactical Network Solutions develop and released Reaver , which is a WPA attack tool that exploits a protocol design flaw in WiFi Protected Setup (WPS). Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP.
Source: TheHackerNews
Subscribe to:
Post Comments
(Atom)
0 comments:
Post a Comment