Extensive Vulnerability Discovered with WIFI WPA2 Security

Discussion in 'Frontpage news' started by Hilbert Hagedoorn, Oct 16, 2017.

  1. Hilbert Hagedoorn

    Hilbert Hagedoorn Don Vito Corleone Staff Member

    Messages:
    30,391
    Likes Received:
    379
    GPU:
    AMD | NVIDIA
    rl66 likes this.
  2. ubercake

    ubercake Member Guru

    Messages:
    105
    Likes Received:
    6
    GPU:
    Asus GTX 1080 FE
    KRACK ATTACK!
     
  3. Biffo

    Biffo Member

    Messages:
    14
    Likes Received:
    1
    GPU:
    ati
    Routers under Windows will be safe against this exploitation since most lock up for 24hrs after so many failed attempts plus no hacker gonna wait around for months or years till all the keys are decrypted.
     
  4. sammarbella

    sammarbella Ancient Guru

    Messages:
    3,629
    Likes Received:
    30
    GPU:
    290X Lightning CFX (H2O)
    Don't worry that's only some billion devices affected...
     

  5. rl66

    rl66 Ancient Guru

    Messages:
    1,514
    Likes Received:
    9
    GPU:
    quadro K6000+Tesla M2090
    yes Lilux sound better :) ... don't worry we understand typonese too.

    More seriously most wireless system are just like a big door with "come in, it's open" written on it.

    but despite that people want more of it, even in their car and in their credit card (btw 1st version of pay without touch were making card detected by bt/wifi sniffer ... imagine how security is taken seriously ... :eek: )
     
  6. schmidtbag

    schmidtbag Ancient Guru

    Messages:
    2,180
    Likes Received:
    64
    GPU:
    HIS R9 290
    Unlike OS or software specific security issues, this is not something that should be made widely known. Most people who use WPA2 are not able to opt for something else or update their device in a useful way. So, I feel like Vanhoef and Piessens have just put waaaay more people at risk than they were before their discovery.

    Think of it like this:
    Imagine someone brings a backpack with a bomb in it in a shopping mall, and just leaves the backpack in the middle of the mall. Then an announcement is made that this backpack has a weapon in it. By letting everyone know that there is something deadly in that backpack, it dramatically increases the probability of someone with malicious intent from using it, possibly before security can diffuse the situation. If the announcement was never made, sure, somebody would've figured it out eventually, but the probability of the weapon being used would be dramatically decreased.

    So the fact of the matter is, the situation was insecure no matter what, but because an announcement was made, that just made things a whole lot worse.
     
  7. GlennB

    GlennB Member

    Messages:
    30
    Likes Received:
    1
    GPU:
    Asus Ati Radeon 7970
    Security through obscurity is not a great way to handle any leak. We cannot know for sure whether this leak has not been found by someone else already.
     
  8. schmidtbag

    schmidtbag Ancient Guru

    Messages:
    2,180
    Likes Received:
    64
    GPU:
    HIS R9 290
    I agree, but with one crucial caveat: if there is a widely available fix. Without a fix, all this announcement does is just beg hackers to take advantage of people. At the very least, they shouldn't have disclosed the details. Just merely telling consumers to look into upgrading their devices due to "a security issue regarding WPA2" ought to be enough. A statement like that may encourage uninformed hackers to try finding out what's wrong, but they don't know what's wrong, which still buys people time. Companies and developers who need/want to address the problem may contact people like these researchers personally to get the information they need to correct the problem.

    There's a right way to approach this situation, and announcing so many details to the public was probably the worst way to go about it; obscurity would've been better. WPA2 has been around for a long time and I'm not aware of any hackers who took advantage of it. But, now there will be.
     
  9. Noisiv

    Noisiv Ancient Guru

    Messages:
    5,892
    Likes Received:
    15
    GPU:
    R9 290 ACIV 1150/1500MHz
    How about... explicitly define allowed devices via MAC address.

    Not practical in a large network, but good fix for home/personal use.
     
    geogan likes this.
  10. JJayzX

    JJayzX Master Guru

    Messages:
    435
    Likes Received:
    1
    GPU:
    Evga GTX 970 SSC
    This attack uses a spoofed MAC. MACs have been easily spoofed for a long time also.
     
    Noisiv likes this.

  11. Noisiv

    Noisiv Ancient Guru

    Messages:
    5,892
    Likes Received:
    15
    GPU:
    R9 290 ACIV 1150/1500MHz
    OK so he retreives my client's MAC address and spoofs it, but what's gonna happen later when two identical MAC clients are connected? None will work correctly?
     
  12. schmidtbag

    schmidtbag Ancient Guru

    Messages:
    2,180
    Likes Received:
    64
    GPU:
    HIS R9 290
    I suppose it depends on what they're trying to do. If the hacker doesn't intend on breaching the security of the spoofed MAC, they could still get in your network disguised as your PC and do whatever else they want. In some cases, the router or conflicting PC won't care if there are duplicate MACs. In the event something does care, the hacker just has to wait until you sign off.
     
  13. Noisiv

    Noisiv Ancient Guru

    Messages:
    5,892
    Likes Received:
    15
    GPU:
    R9 290 ACIV 1150/1500MHz
    The more I read about this... this be some serious shiit. A someone directly hacking my personal device(s), that's the least of problems.
     
  14. HeavyHemi

    HeavyHemi Ancient Guru

    Messages:
    5,302
    Likes Received:
    24
    GPU:
    GTX1080Ti
    Krack is whack!
     
    The Phoenix likes this.
  15. Athlonite

    Athlonite Maha Guru

    Messages:
    1,168
    Likes Received:
    3
    GPU:
    Nitro+RX580 8GB OC
    Oh great lets put out a video showing any wood-be hacker how it's done a simple there's a security problem with WPA2 and you'll need to update your device when a fix is availably statement would have sufficient
     

  16. LIGuitar77

    LIGuitar77 Master Guru

    Messages:
    498
    Likes Received:
    4
    GPU:
    ASUS 7790 2GB OC
    I am absolutely sure this was asked with integrity so I will answer you the same: Are ALL of your machines connected 24/7, meaning 100% of the time? Really?

    Ok. Fine. (I am assuming you are saying yes, to put to far end of spectrum.) Man-in-middle or monkey-in-the-middle attacks actually can and do knock clients offline (have any of you experienced this? :) ) - and then they reconnect. Ok, things are great now. No more problems.

    No, they're not. Capisce? :)
     
  17. LIGuitar77

    LIGuitar77 Master Guru

    Messages:
    498
    Likes Received:
    4
    GPU:
    ASUS 7790 2GB OC
    In other words, if YOU know you did AWESOME with wifi settings (you are a Guru irl or just simply know your crap) and still unexplained disconnects happen when your drivers and firmware are updated and all good things along those lines - radio is not congested on your channel >>> so on and so on - peek outside your window and see if there is a shady car. lol
     
  18. LIGuitar77

    LIGuitar77 Master Guru

    Messages:
    498
    Likes Received:
    4
    GPU:
    ASUS 7790 2GB OC
    Only for extreme (I really mean extreme necessity, like you have a billion dollar idea and people are trying to steal it from you actively lol): Look into Radius server. You're welcome.
     
  19. geogan

    geogan Master Guru

    Messages:
    319
    Likes Received:
    4
    GPU:
    Gigabyte GTX 1070 XTREME
    How does the attacker get a valid MAC address that is on the allowed list though? He would never get in by just randomly searching through thousands of MAC addresses. Do they use some method to find out the MACs of devices already on the network?
     
  20. geogan

    geogan Master Guru

    Messages:
    319
    Likes Received:
    4
    GPU:
    Gigabyte GTX 1070 XTREME
    Anyway let me play devil advocate here...

    TBH that Krack "attack" to me is just another way for the government agencies to trick or frighten users into updating all the routers in existence with their latest "approved" firmware which is loaded with their own backdoors and snoops. IMO it is better to have a 1% chance of some lonely hacker deciding he wants to try and get into your network than 100% chance you now have installed the NSAs latest backdoor entry toolkit on your router... i'm keeping my own 6 year old router firmware to keep NSA out...
     

Share This Page