- Cryptzone AB
- Drakegatan 7
- 41250 Göteborg
- Contact person
- Darshna Kamani
- +44 (20) 7183-2839
Cryptzone says WPS security issues are just the tip of the insecurity iceberg
According to Anders Hansson, CTO of the IT Threat mitigation vendor, the fact that the WEP and WPA wireless password systems have long since been cracked, and - with suitable software and enough processing power - WPA2 passwords can also be cracked in just a few hours, the WPS loophole discovery is actually a minor security issue.
"Using software such as Elcomsoft's Wireless Security Auditor (WSA - http://bit.ly/uWNLC2) it's now possible to stage a high-powered dictionary attack on a WPA2-passphrase protected wireless system and generate results in just a few hours," he said.
"Against this backdrop, the fact that the WPS method of allowing easy connection to a wireless network has been compromised is actually something of an irrelevance, since there are several other methods of cracking a WPA2 wireless passphrase," he added.
Hansson went on to say that the WiFi Alliance originally developed WPS as a means of simplifying the connection of a device to a home or office wireless network, with the router including a flag in the EAP-NACK message that tells the user if the first half of the passphrase they have typed is correct.
The security flaw, he explained, reduces the time it takes to crack an average WPA2 passphrase down to 104x103 attempts - about 11,000 attempts in total.
Assuming you are using software capable of generating and using - say - 10 passphrase attempts a second (600 a minute), it doesn't take a mathematical genius to realise that a WPA2-WPS router passphrase can be compromised in under 20 minutes.
The reality, says Hansson, is that wireless networks have been regarded as insecure for more than a year now, owing to the rise in processing power accessible to hackers, and the arrival of password cracking software like WSA from Elcomsoft.
"The solution to this issue is that companies should not rely on wireless networks to distribute their networks across and around the office. Hard-wired Ethernet connections, in all their various shapes and forms, are the only truly secure means of connecting to a network resource," he said.
"And corporates should also note that staff who access the office resources form a home network should also presume that their home wireless network can be cracked in relatively short order. For this reason, if staff really must access the company systems via WiFi, then the use of VPN technology is a must-have," he added.
"Wireless is a very convenient method of accessing a networked resource, but without the use of additional encryption - even before Craig Heffner's discovery of WPS security problems - the technology has to be considered insecure. All this latest discovery confirms is that wireless access is inherently secure - and we knew that already."
For more on Cryptzone: http://www.cryptzone.com
For more on WPS insecurity problems: http://bit.ly/tIcrVg
Für die oben stehenden Pressemitteilungen, das angezeigte Event bzw. das Stellenangebot sowie für das angezeigte Bild- und Tonmaterial ist allein der jeweils angegebene Herausgeber (siehe Firmeninfo bei Klick auf Bild/Meldungstitel oder Firmeninfo rechte Spalte) verantwortlich. Dieser ist in der Regel auch Urheber der Pressetexte sowie der angehängten Bild-, Ton- und Informationsmaterialien.
Die Nutzung von hier veröffentlichten Informationen zur Eigeninformation und redaktionellen Weiterverarbeitung ist in der Regel kostenfrei. Bitte klären Sie vor einer Weiterverwendung urheberrechtliche Fragen mit dem angegebenen Herausgeber. Bei Veröffentlichung senden Sie bitte ein Belegexemplar an firstname.lastname@example.org.