Advertisement
Help Keep Boards Alive. Support us by going ad free today. See here: https://subscriptions.boards.ie/.
If we do not hit our goal we will be forced to close the site.

Current status: https://keepboardsalive.com/

Annual subs are best for most impact. If you are still undecided on going Ad Free - you can also donate using the Paypal Donate option. All contribution helps. Thank you.
https://www.boards.ie/group/1878-subscribers-forum

Private Group for paid up members of Boards.ie. Join the club.

WPA keys gone in 60 seconds

  • 01-11-2009 12:22AM
    #1
    Moderators, Recreation & Hobbies Moderators, Science, Health & Environment Moderators, Technology & Internet Moderators Posts: 95,953 Mod ✭✭✭✭


    http://www.theregister.co.uk/2009/08/28/wpa_60sec/

    In a recently released paper, Ohigashi and Morii proposed a man-in-the-middle style of attack – also used by the Beck-Tews approach – in which a user’s communication is intercepted by an attacker.

    This approach carries a high risk of detection, the pair admitted, so being able to shorten the attack time down to under one minute is a major advantage – to potential hackers, at least.

    Ohigashi’s and Morii’s technique doesn’t work in WPA 2 – the AES-based successor to WPA.


Comments

  • Closed Accounts Posts: 325 ✭✭hello932


    How long do you think that a new attack for WPA2 PSK with AES will take?


Advertisement