Researchers Crack WPA



User avatar

Hero Member
Hero Member

Posts: 1911

Joined: Mon Dec 11, 2006 3:23 pm

Post Fri Nov 07, 2008 2:18 pm

Researchers Crack WPA




Posts: 13

Joined: Thu Oct 16, 2008 10:34 am

Post Sat Nov 08, 2008 8:42 am

Re: Researchers Crack WPA

I will say, that word sequence"Crack WPA"is very loudly...
http://www.theregister.co.uk/2008/11/08 ... ss_attack/
This is a TKIP flaw... and Tews-Becker attack is based on old fashioned Korek's chopchop inductive packet guess idea. Idea is realized in aircrack-ng -4 tool against WEP (DWEP) an is very impressive: don't look for encryption key itself, find out short keystream to perform packet injectiion with arp(icmp) packets afterward.
TKIP utilize RC4 encryption with MIC(michael) packet integrity. In WEP case, if inductive guess is correct, AP answer is positve, in TKIP case, if packet guess is correct, but MIC fails, AP respond with: wait a 1 minute.
And so, there are 14 unknown arp packet bytes, and less than 15 minutes need to discover full arp packet.
Attack is very limited and employed in DoS attacks with arp(icmp ) packet injection.
Recommendation: move to WPA2 + CCMP

Return to Wireless

Who is online

Users browsing this forum: No registered users and 1 guest

Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software