Jump to content

WPA2 has been cracked

snortingfrogs
2 hours ago, paddy-stone said:

Might sound stupid here (probably). But what if you don't broadcast your SSID?

Might just be better to reduce the power on your router. I can't access my network outside of my house, so someone would have to break in to attack WiFi... Internet security would be the least of problems at that point.

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, Ryujin2003 said:

Might just be better to reduce the power on your router. I can't access my network outside of my house, so someone would have to break in to attack WiFi... Internet security would be the least of problems at that point.

I think realistically most router companies will release a patch or firmware update for this like mine did. So none of that would be necessary. 

Do you even fanboy bro?

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Liltrekkie said:

I think realistically most router companies will release a patch or firmware update for this like mine did. So none of that would be necessary. 

I would hope so, but what she gets cut off? Only AC routers get the update? Or everything from past 5 years? I guess I'll log into my router and check for updates regularly.

 

Sidenote, I have a second there that only received the signal from my main router and then retransmits ONLY via LAN. Will this still be  you cannot connect to it wirelessly and it does show up as an option. It's just a bridge.

Link to comment
Share on other sites

Link to post
Share on other sites

Everybody panic!

Mobo: Z97 MSI Gaming 7 / CPU: i5-4690k@4.5GHz 1.23v / GPU: EVGA GTX 1070 / RAM: 8GB DDR3 1600MHz@CL9 1.5v / PSU: Corsair CX500M / Case: NZXT 410 / Monitor: 1080p IPS Acer R240HY bidx

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, huilun02 said:

Hacker would have to be in wifi range, and then router admin would be able to see a new unknown client

I might be mistaken, but I’m pretty sure this would allow a hacker to just snoop on the packets any given client is sending/receiving.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, leadeater said:

Ok

 

d4a.gif

48 minutes ago, Kamina said:

Everybody panic!

Is it Nine in the Afternoon, already?!

Cor Caeruleus Reborn v6

Spoiler

CPU: Intel - Core i7-8700K

CPU Cooler: be quiet! - PURE ROCK 
Thermal Compound: Arctic Silver - 5 High-Density Polysynthetic Silver 3.5g Thermal Paste 
Motherboard: ASRock Z370 Extreme4
Memory: G.Skill TridentZ RGB 2x8GB 3200/14
Storage: Samsung - 850 EVO-Series 500GB 2.5" Solid State Drive 
Storage: Samsung - 960 EVO 500GB M.2-2280 Solid State Drive
Storage: Western Digital - Blue 2TB 3.5" 5400RPM Internal Hard Drive
Storage: Western Digital - BLACK SERIES 3TB 3.5" 7200RPM Internal Hard Drive
Video Card: EVGA - 970 SSC ACX (1080 is in RMA)
Case: Fractal Design - Define R5 w/Window (Black) ATX Mid Tower Case
Power Supply: EVGA - SuperNOVA P2 750W with CableMod blue/black Pro Series
Optical Drive: LG - WH16NS40 Blu-Ray/DVD/CD Writer 
Operating System: Microsoft - Windows 10 Pro OEM 64-bit and Linux Mint Serena
Keyboard: Logitech - G910 Orion Spectrum RGB Wired Gaming Keyboard
Mouse: Logitech - G502 Wired Optical Mouse
Headphones: Logitech - G430 7.1 Channel  Headset
Speakers: Logitech - Z506 155W 5.1ch Speakers

 

Link to comment
Share on other sites

Link to post
Share on other sites

50 minutes ago, Kamina said:

Everybody panic!

At the Disco?

 

5 minutes ago, leadeater said:

Ok

 

d4a.gif

So long as this man is safe, I'm all good.

Bobobo-bo-Bo-bobo-anime-38770110-640-480.jpg.5e38c9758b0679e195f091c9205c014a.jpg

10 minutes ago, ARikozuM said:

Is it Nine in the Afternoon, already?!

15 after tha hour, it's kinda cheesy.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

Which means it wouldn't matter if I replace the ISP provided router/modem combo with a dedicated router. But I don't think at the moment people should panic unless you're a government employee or a big corporation. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, Lurick said:

From what I can tell with a brief look over the paper, it MIGHT be able to be fixed with a firmware upgrade or code change to the key generation algorithm on the router's side. From reading one of the sections about getting the KEK, depending on what's used by the router itself to generate the key (big or small endians) then it can be a monumental task to get the key. The attack also appears to need TKIP to work, which should have been replaced by AES-256 at this point and using AES might make this attack moot, but I haven't read much more beyond that.

The issue is that some wireless APs/routers use AES + TKIP for fallback and backwards compatibility for some older clients. In which case, we're all screwed in the name of compatibility (on 2.4Ghz N and below). Most routers run in Mixed mode, so its definatly still an issue.

▶ Learn from yesterday, live for today, hope for tomorrow. The important thing is not to stop questioning. - Einstein◀

Please remember to mark a thread as solved if your issue has been fixed, it helps other who may stumble across the thread at a later point in time.

Link to comment
Share on other sites

Link to post
Share on other sites

Has anyone confirmed it's just TKIP with the problem? The tweets say otherwise.

MOAR COARS: 5GHz "Confirmed" Black Edition™ The Build
AMD 5950X 4.7/4.6GHz All Core Dynamic OC + 1900MHz FCLK | 5GHz+ PBO | ASUS X570 Dark Hero | 32 GB 3800MHz 14-15-15-30-48-1T GDM 8GBx4 |  PowerColor AMD Radeon 6900 XT Liquid Devil @ 2700MHz Core + 2130MHz Mem | 2x 480mm Rad | 8x Blacknoise Noiseblocker NB-eLoop B12-PS Black Edition 120mm PWM | Thermaltake Core P5 TG Ti + Additional 3D Printed Rad Mount

 

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, MrUnknownEMC said:

MAC FILTERING ON. SEPARATED VLAN ON. Still only would able to access my wireless network unless i have made firewall pinhole for certain mac addresses. 

MAC filtering is basically worthless; MAC Address spoofing is stupidly easy. 

PSU Tier List | CoC

Gaming Build | FreeNAS Server

Spoiler

i5-4690k || Seidon 240m || GTX780 ACX || MSI Z97s SLI Plus || 8GB 2400mhz || 250GB 840 Evo || 1TB WD Blue || H440 (Black/Blue) || Windows 10 Pro || Dell P2414H & BenQ XL2411Z || Ducky Shine Mini || Logitech G502 Proteus Core

Spoiler

FreeNAS 9.3 - Stable || Xeon E3 1230v2 || Supermicro X9SCM-F || 32GB Crucial ECC DDR3 || 3x4TB WD Red (JBOD) || SYBA SI-PEX40064 sata controller || Corsair CX500m || NZXT Source 210.

Link to comment
Share on other sites

Link to post
Share on other sites

40 minutes ago, Swatson said:

Has anyone confirmed it's just TKIP with the problem? The tweets say otherwise.

it's not. It's WPA2 in general and the flaw is in the 4-way handshake itself. Not the encryption algo.

 

 

so... yeah this is gonna be a fun conversation at work tomorrow. lol

"If a Lobster is a fish because it moves by jumping, then a kangaroo is a bird" - Admiral Paulo de Castro Moreira da Silva

"There is nothing more difficult than fixing something that isn't all the way broken yet." - Author Unknown

Spoiler

Intel Core i7-3960X @ 4.6 GHz - Asus P9X79WS/IPMI - 12GB DDR3-1600 quad-channel - EVGA GTX 1080ti SC - Fractal Design Define R5 - 500GB Crucial MX200 - NH-D15 - Logitech G710+ - Mionix Naos 7000 - Sennheiser PC350 w/Topping VX-1

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Arokhantos said:

 

Aren't those usually the most lazy about upgrading or fixing things ?

Most of them that’s why they’re frequently targeted for hacking. Don’t get me started with corporations using out of date operating systems and refusing update installations. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, bcredeur97 said:

it's not. It's WPA2 in general and the flaw is in the 4-way handshake itself. Not the encryption algo.

 

 

so... yeah this is gonna be a fun conversation at work tomorrow. lol

IT Manager: Uhmm, yeah, we're gonna have to replace all of our wireless APs...

Executive: Didn't we just finish rolling out the upgrades last month?

IT Manager: Uhmm, yeah...

Executive: ... ... ... You're fired.

My eyes see the past…

My camera lens sees the present…

Link to comment
Share on other sites

Link to post
Share on other sites

Wonder how long it will take Apple to update their AirPort base stations. Also wonder how long it will take Linksys to update my router. 

Laptop: 2019 16" MacBook Pro i7, 512GB, 5300M 4GB, 16GB DDR4 | Phone: iPhone 13 Pro Max 128GB | Wearables: Apple Watch SE | Car: 2007 Ford Taurus SE | CPU: R7 5700X | Mobo: ASRock B450M Pro4 | RAM: 32GB 3200 | GPU: ASRock RX 5700 8GB | Case: Apple PowerMac G5 | OS: Win 11 | Storage: 1TB Crucial P3 NVME SSD, 1TB PNY CS900, & 4TB WD Blue HDD | PSU: Be Quiet! Pure Power 11 600W | Display: LG 27GL83A-B 1440p @ 144Hz, Dell S2719DGF 1440p @144Hz | Cooling: Wraith Prism | Keyboard: G610 Orion Cherry MX Brown | Mouse: G305 | Audio: Audio Technica ATH-M50X & Blue Snowball | Server: 2018 Core i3 Mac mini, 128GB SSD, Intel UHD 630, 16GB DDR4 | Storage: OWC Mercury Elite Pro Quad (6TB WD Blue HDD, 12TB Seagate Barracuda, 1TB Crucial SSD, 2TB Seagate Barracuda HDD)
Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, Ryujin2003 said:

I would hope so, but what she gets cut off? Only AC routers get the update? Or everything from past 5 years? I guess I'll log into my router and check for updates regularly.

 

Sidenote, I have a second there that only received the signal from my main router and then retransmits ONLY via LAN. Will this still be  you cannot connect to it wirelessly and it does show up as an option. It's just a bridge.

Anything that receives active product support will get a firmware update. So about 10 years, company depending.

Do you even fanboy bro?

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, bcredeur97 said:

it's not. It's WPA2 in general and the flaw is in the 4-way handshake itself. Not the encryption algo.

 

 

so... yeah this is gonna be a fun conversation at work tomorrow. lol

@Lurick

 

Any idea how this is going to effect RADIUS/802.1x wireless networks? I'd like to say they should not be affected but I'd like to see those unreleased CVE's first, it could also depend on implementation too so there might not even be a solid answer.

Link to comment
Share on other sites

Link to post
Share on other sites

the paper for this was released last year.

 

Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys [pdf]

 

https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_vanhoef.pdf

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

8 hours ago, leadeater said:

Haven't most people in the security industry recommended to not use TKIP for a few years now? I thought flaws with it were already discovered, or at least theorized. 

I was always told that TKIP was only supposed to be used for legacy devices.

-KuJoe

Link to comment
Share on other sites

Link to post
Share on other sites

43 minutes ago, vorticalbox said:

the paper for this was released last year.

 

Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys [pdf]

 

https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_vanhoef.pdf

That is not the same paper.

It's written by the same author and is most likely related, but it will not be the exact same paper.

The white paper released today will most likely include many new vulnerabilities and attacks.

 

 

3 hours ago, Zodiark1593 said:

IT Manager: Uhmm, yeah, we're gonna have to replace all of our wireless APs...

Executive: Didn't we just finish rolling out the upgrades last month?

IT Manager: Uhmm, yeah...

Executive: ... ... ... You're fired.

APs won't need to be replaced. At worst the controller will need to be replaced, but it seems like some vendors have already started sending out updates for it (Meraki, Mikrotik, Ubiquiti).

So chances are this will only be a problem for consumer stuff.

 

 

4 hours ago, Swatson said:

Has anyone confirmed it's just TKIP with the problem? The tweets say otherwise.

Nothing is known yet, but it seems like this will not be an issue related to TKIP. It seems to be something else.

The author of the original article decided to include an extract from an old report which was related to TKIP, but this seems to be something completely different.

Link to comment
Share on other sites

Link to post
Share on other sites

Thank god Ubiquiti already released firmware to address these exploits.

-KuJoe

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, djdwosk97 said:

MAC filtering is basically worthless; MAC Address spoofing is stupidly easy. 

 

wouldn't the person who wants unrequested access to your wifi network then need to know a white listed mac address?

Grammar and spelling is not indicative of intelligence/knowledge.  Not having the same opinion does not always mean lack of understanding.  

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, mr moose said:

 

wouldn't the person who wants unrequested access to your wifi network then need to know a white listed mac address?

I don't remember where the WPA2 encryption is applied, but chances are the MAC address is not encrypted. If that's the case then finding a white listed mac address will take like 10 seconds (not hyperbole).

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×