HEXUS Forums :: 6 Comments

Login with Forum Account

Don't have an account? Register today!
Posted by peterb - Wed 08 Aug 2018 14:00
The source and discussion is here: (Also linked to in the above article)

https://hashcat.net/forum/thread-7717.html

Which indicates to consumer grade devices may not be affected - although the latest Fritz Box OS update may introduce this vulnerability.

Be interested to see if the Draytek series are affected - no doubt there will be a security update in due course.
Posted by philehidiot - Wed 08 Aug 2018 15:33
How long to crack it? How many GPUs? Well I suppose we've found a use for all the old mining stock.

Last time I tried to break WPA2 (I gave it the handshake to make life easier for it), the hackintosh nearly had a stroke.

Yes, I set up a network so I could try and hack it whilst slightly drunk. I'm a sad, sad person.
Posted by virtuo - Wed 08 Aug 2018 15:43
philehidiot
Yes, I set up a network so I could try and hack it whilst slightly drunk. I'm a sad, sad person.

Worse when you do it sober

… hm :(
Posted by Iota - Wed 08 Aug 2018 19:16
philehidiot
Yes, I set up a network so I could try and hack it whilst slightly drunk. I'm a sad, sad person.

Not really, I once took issue with neighbours wi-fi networks broadcasting across the range for the best channel for my own network. It's the only time I've ever used a linux distro, in efforts to gain access to their routers to put them on a fixed channel not close to mine. TL;DR Takes a long time depending on hardware in use, gave up with my ancient laptop.

It is best not to use the “obvious pattern” following manufacturer generated PSK, Steube advised users; rather make up your own with complex arrangements of letters and symbols. “A typical manufacturers PSK of length 10 takes 8 days to crack (on a 4 GPU box),” explained Steube.

Pretty obvious advice, as is turning off roaming and automatically connecting to networks on your devices (especially if hiding your SSID).
Posted by philehidiot - Thu 09 Aug 2018 10:00
Iota
Not really, I once took issue with neighbours wi-fi networks broadcasting across the range for the best channel for my own network. It's the only time I've ever used a linux distro, in efforts to gain access to their routers to put them on a fixed channel not close to mine. TL;DR Takes a long time depending on hardware in use, gave up with my ancient laptop.

My finest moment in this domain was some years ago when a friend was having some script kiddie keep trying to hack him and kept bouncing off the firewall and annoying him with endless pop up messages alerting him to the attempts but furnishing him with the IP address, which he passed on to me.

I can't quite remember what I did it was so long ago but it was essentially an improvised DOS attack. Very effective and he stopped his attempts to hack my friend after a couple of minutes. Things like that are useful to know how to do for situations like that (it was probably only a matter of time before the guy actually found an open port) as long as you're not a prat with it.
Posted by Dashers - Thu 09 Aug 2018 12:53
I seem to recall that the original WPA2 attack was effective against WPA2-EAP as well as PSK, albeit only against one user. Does anybody know if EAP is vulnerable to this hack, and I guess by extension, if all variants of EAP are effected?