Millions of Wireless Routers Exposed to Brute Force Attacks

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Softpedia said:
A design flaw recently discovered in the WiFi Protected Setup (WPS) could make it easier for hackers to launch a brute force attack on the PIN of a device since they can easily find out when the first half of the 8 digit PIN is accurate.

The United States Computer Emergency Readiness Team (US-CERT) was recently informed on the issue by security researcher Stefan Viehbock who found the weakness.

WPS, the computing standard developed to make it easier for users to secure home wireless networks, contains an authentication method called “external registrar” that only requires the router’s PIN to allow access.

It turns out that by design this method is susceptible to a brute force attack against the device's PIN.

“When the PIN authentication fails the access point will send an EAP-NACK message back to the client. The EAP-NACK messages are sent in a way that an attacker is able to determine if the first half of the PIN is correct,” reads the advisory posted by US-CERT.

“Also, the last digit of the PIN is known because it is a checksum for the PIN. This design greatly reduces the number of attempts needed to brute force the PIN. The number of attempts goes from 108 to 104 + 103 which is 11,000 attempts in total.”

Since some wireless routers don’t implement any kind of lock-out policy against brute force attempts and some even result in a denial-of-service (DoS) condition after such an attempt, an attack that targets the PIN could be successfully performed in a fairly short time.


Read more....
 

iPanik

New Member
Feb 28, 2011
530
Correct me if i'm wrong, but isn't WPS activated on-demand? I can't connect to my router with WPS before i hit a button on the side of it.
Wouldn't that mean that hackers would require physical access to the router?

For now, there are no known ways to mitigate the problem, but experts recommend the use of WPA2 encryption with a strong password, disabling UPnP and enabling MAC address filtering to make sure only trusted devices can connect to the wireless network.
MAC address filtering is a bad idea, since MAC addresses can be easily spoofed.
 

DiabloBlack

New Member
Nov 5, 2011
193
I have the PIN disabled on my router effectively disabling WPS. I don't use WPS so I see no reason to have it turned on. Would be nice if all wireless routers had this feature.
 

Prorootect

Level 69
Verified
Nov 5, 2011
5,855
'that's why i don't use Wifi anymore' - like me ..

:dodgy: :s .. and WiFi MOUSE ?:huh:

Aaa .. - yes, I did this from the cat's position .. from the perspective of a cat!
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top