Tuesday, April 17, 2012

Found serious vulnerabilities in the protocol of WPA


Researchers Tyuz Eric (Erik Tews) and Martin Beck (Martin Beck) have found serious vulnerabilities in the protocol of WPA (Wireless Protected Access), which is still considered a reliable alternative to the other, has long been compromised security protocol WEP (Wireless Encryption Protocol).
It should be noted that while Tyuzu and Beck managed to crack the encryption keys used for data that comes from the point of access to a PC. Those keys are used to protect data transmitted from the PC to the access point, were not compromised. The results of his study and the detailed methods of hacking the authors promise to present at the conference PacSec, to be held next week in Tokyo.
To crack WPA security protocol Tyuz and Beck used the tool Aircrack-ng, as well as some mathematical developments that have not yet been made public. The main target for attack were the keys TKIP (Temporal Key Integrity Protocol) - they can crack just 12-15 minutes, and without the use of ...
WPA protocol is widely used in modern networks, Wi-Fi, and more recently its successor, WPA2 is gradually. Nevertheless, most access points, offering protection protocol WPA2, maintain a normal version of the WPA, which could potentially become a loophole for criminals. In particular, it is now a major retail chain T. J. Maxx spends transition from WEP, WPA protocol to normal after a major leak fixed - for two years through a vulnerable wireless network criminals have stolen hundreds of millions of credit card numbers.
All users of wireless Wi-Fi networks are necessary to reflect the mandatory use of virtual private networks and encryption mechanism WPA2 - all other methods have been compromised, although to varying degrees. Well, the wait for the results of the conference PacSec - perhaps born before our eyes a whole new family of serious threats to many quite modern Wi-Fi networks.
Source:. Security Lab.

No comments:

Post a Comment