Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Are eircom wifi passwords safe seeing as they create complex ones themselves?

  • 23-03-2014 8:19pm
    #1
    Registered Users, Registered Users 2 Posts: 1,977 ✭✭✭


    Hi,
    We have an eircom router and it has a long password for the wifi at the back - it seems very random - I have come across another router done this same way.

    Does this mean it's going to be more or less impossible for someone to brute force my password even if they have a "wpa handshake" captured?

    Thanks.


Comments

  • Registered Users, Registered Users 2 Posts: 772 ✭✭✭maki


    Impossible? No. It's possible (albeit incredibly unlikely) that the very first key from a brute force attack would match up.
    WPA has a minimum key length of 8. Using that length and a random mix of alpha-numeric characters the median time of a key match would be in the thousands of years. Millions if you add more characters.


  • Registered Users, Registered Users 2 Posts: 1,977 ✭✭✭euser1984


    Is there issues if WPS is enabled though?


  • Registered Users, Registered Users 2 Posts: 772 ✭✭✭maki


    euser1984 wrote: »
    Is there issues if WPS is enabled though?

    Huge issues yes. If possible disable it. You can always re-enable it when you need it.


  • Registered Users, Registered Users 2 Posts: 44 myrscossie


    It does not take thousands of years any more not when you use CLOUD base hacking it takes 20min now.


  • Registered Users, Registered Users 2 Posts: 9,605 ✭✭✭gctest50


    myrscossie wrote: »
    It does not take thousands of years any more not when you use CLOUD base hacking it takes 20min now.


    2009 :)

    Summary: A new, cloud-based hacking service says it can crack a WPA Wi-Fi network password in just 20 minutes.


    By Andrew Nusca f....... | December 8, 2009 -- 09:31 GMT


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 760 ✭✭✭mach1982


    The password is not random , it was generated using a computer algorithm created by eircom, that generates a Hexadecimal key.In the case of the WEP it was the serial number, which was part of the default name of router , that was add to a line of some song then put through the algorithm.

    No wireless encryption is safe , they can all be broken , just might take long with WPA2.


  • Registered Users, Registered Users 2 Posts: 758 ✭✭✭gears


    It depends on the router you have,as far as getting your password does anyone remember or still use the Dessid app


  • Registered Users, Registered Users 2 Posts: 104 ✭✭BenRowe


    gears wrote: »
    It depends on the router you have,as far as getting your password does anyone remember or still use the Dessid app
    how can you tell which router is vulnerable if wps is enabled?


  • Moderators, Technology & Internet Moderators Posts: 4,621 Mod ✭✭✭✭Mr. G


    BenRowe wrote: »
    how can you tell which router is vulnerable if wps is enabled?

    WPS (wireless protected setup) is not secure regardless of the type of router.

    Here are a few tips to help prevent your WiFi network getting hacked:
    1. Change your wireless password at least once a year to something with greater than 24 characters (numbers and letters, which a symbol or something).

    2. Change the SSID if you wish. It would have no security benefit really.

    3. Set your wireless security type to WPA2.

    4. Check the devices connected to the network occasionally.

    5. Change the router administration portal username and password.

    6. If you really want to lock things down, limit the network to specified MAC addresses. MAC addresses can be spooled but it should deter the average user who managed to get your password.

    As mentioned, no wireless connection is 100% secure. Doing the above would limit the majority of users from getting in.


Advertisement