Home routers under attack...
Register to Remove
#32
Posted 30 December 2011 - 02:21 PM
BrianKrebs
December 30, 2011 at 2:29 pm
@doug:
The important thing to keep in mind with this flaw is that devices with WPS built-in are vulnerable whether or not users take advantage of the WPS capability in setting up their router. Also, routers that include WPS functionality are likely to have this feature turned on by default.
Additionally, it appears that Belkin has issued a firmware update to address this vulnerability.
No word from other popular Router manufacturers.
______________________
For my own Network, I use Linksys WRT 400N by Cisco
In the name and password protected browser accessed Router Setup
Go to - Wireless - Basic Wireless Settings - Configuration View
The top item on that panel is "Manual" vs. "Wi-Fi Protected Setup"
Select - Manual - then press Save Settings
Continue with WPA2 Security Mode to set your Passphrase.
The above will have done all that can be done by the owner/user at this time to prevent the described vulnerability.
I'm hopeful that firmware updates will be published.
If you wish, you may Donate to help keep us online.
#33
Posted 31 December 2011 - 04:10 PM
Can be found at http://192.168.1.1/WAdv.htm
> Wireless > Advanced Wireless Settings
... apparently called "Secure Easy Setup" on many routers instead of "WPS".
___
- https://isc.sans.edu...l?storyid=12292
Last Updated: 2011-12-30 03:19:11 UTC - "... Disable WPS..."
.
.The machine has no brain.
......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
#34
Posted 01 January 2012 - 01:08 AM
1) "Using WPS, the user can enable strong encryption for the wireless network simply by pushing a button on the router and then entering the PIN..."
2) "He said his tool took about four hours to test all possible combinations on TP-Link and D-Link routers he examined, and less than 24 hours against a Netgear router."
Frankly, if a "hacker" breaks into my house to push a button on my router and then sits there for up to 24 hours to connect to my wireless network (no doubt pushing the button again and again and again every time it times out), it must be one of my friends or I'm just plain on vacation. Its an interesting article but nothing more than a proof of concept requiring impossible circumstances.
Correct me if I'm wrong.
-----
I do stand corrected. I kept on searching and finally found this: http://sviehb.files....ehboeck_wps.pdf
An article that finally explains the attack, as the article linked to in this thread is misleading, as well as several other pieces of literature including a wikipedia article on wi-fi protected setup. Now I understand that push button connect is only one of three supported authentication methods, and this attack does not require pushing the button. Guess its a good thing I have always disabled WPS. Ofcourse, if I had ever used it I might've known how it works.
Edited by appleoddity, 01 January 2012 - 01:22 AM.
The help you have been given is free. If you have been happy with our help please consider donating to support this forum.
If you would like to say thanks for the help I have given you please View My Profile and Leave a Comment.
Your encouragement is welcome.
#35
Posted 01 January 2012 - 03:11 AM
How long do you think it will take the billion dollar cybercrime industry to further that "research" and come up with an exploit that works remotely? Nothing "cute" about that - and when they do, you won't find it on the Web in a search - until it's after the fact.
- http://blog.eset.com...wireless-router
December 30, 2011 - "... it’s a game of cat-and-mouse. Exploits will always be a nuisance..."
.
Edited by AplusWebMaster, 01 January 2012 - 10:17 AM.
.The machine has no brain.
......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
#36
Posted 01 January 2012 - 11:39 AM
The help you have been given is free. If you have been happy with our help please consider donating to support this forum.
If you would like to say thanks for the help I have given you please View My Profile and Leave a Comment.
Your encouragement is welcome.
#37
Posted 01 January 2012 - 02:08 PM
If you wish, you may Donate to help keep us online.
#38
Posted 01 January 2012 - 03:06 PM
Edited by appleoddity, 01 January 2012 - 03:54 PM.
The help you have been given is free. If you have been happy with our help please consider donating to support this forum.
If you would like to say thanks for the help I have given you please View My Profile and Leave a Comment.
Your encouragement is welcome.
#39
Posted 01 January 2012 - 04:46 PM
If you wish, you may Donate to help keep us online.
#40
Posted 02 January 2012 - 05:13 AM
Register to Remove
#41
Posted 05 January 2012 - 01:01 PM
Results demonstrate router vulnerability, whether or not WPS is disabled.
http://arstechnica.c...with-reaver.ars
If you wish, you may Donate to help keep us online.
#42
Posted 05 January 2012 - 01:49 PM
The help you have been given is free. If you have been happy with our help please consider donating to support this forum.
If you would like to say thanks for the help I have given you please View My Profile and Leave a Comment.
Your encouragement is welcome.
#43
Posted 07 January 2012 - 07:01 PM
WPS vulnerable to Brute-Force Attack
- https://www.us-cert..../TA12-006A.html
January 06, 2012 - "... Solution: Update Firmware: Check your access point vendor's support website for updated firmware that addresses this vulnerability. Further information -may- be available in the Vendor Information section of VU#723755* and in a Google spreadsheet called WPS Vulnerability Testing**.
Disable WPS: Depending on the access point, it may be possible to disable WPS. Note that some access points may -not- actually disable WPS when the web management interface indicates that WPS is disabled..."
* http://www.kb.cert.o.../723755#vendors
** https://docs.google....NSSHZEN3c#gid=0
___
Cisco WPS vuln Response
- http://tools.cisco.c...onalInformation
2012-January-18 - Rev 2.0 - Updated information for the WRP400.
Edited by AplusWebMaster, 19 January 2012 - 04:50 AM.
.The machine has no brain.
......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
#44
Posted 28 January 2012 - 06:04 AM
- http://tools.cisco.c...ecurityResponse
Cisco WPS vuln - status updated ...
- http://tools.cisco.c...sr-20120111-wps
2012-January-27 - Revision 3.0... Updated the Cisco UC320W WPS Disable status to Yes due to release of DisableWPS.pmf**. Added Cable and DSL access products currently under investigation. Added a link to Linksys product documentation*...
WPS vulnerability status update for Linksys devices
* http://www6.nohold.n...articleid=25154
"... Cisco will be releasing firmware that allows customers to disable Wi-Fi Protected Setup to eliminate exposure to this issue... table lists affected products and will be updated with dates and firmware version numbers that include the ability to disable WPS..."
** https://supportforum.../docs/DOC-16301
Last Modified: Jan 26, 2012 - Rev. 10
___
- http://www.kb.cert.o.../723755#vendors
Last Updated: 2012-01-28
Edited by AplusWebMaster, 29 January 2012 - 06:59 AM.
.The machine has no brain.
......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
#45
Posted 16 May 2012 - 12:44 PM
WPS PIN brute force vulnerability
- http://www.kb.cert.o.../723755#vendors
Last revised: 10 May 2012
Overview: The WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack. A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct. The lack of a proper lock out policy after a certain number of failed attempts to guess the PIN on many wireless routers makes this brute force attack that much more feasible...
Impact: An attacker within range of the wireless access point may be able to brute force the WPS PIN and retrieve the password for the wireless network, change the configuration of the access point, or cause a denial of service...
Please consider the following workarounds:
> Disable WPS
Within the wireless router's configuration menu, disable the external registrar feature of WiFi Protected Setup (WPS). Depending on the vendor, this may be labeled as external registrar, router PIN, or WiFi Protected Setup...
References:
- http://sviehb.wordpr...-vulnerability/
- http://en.wikipedia....Protected_Setup
- http://download.micr...WCN-Netspec.doc
- http://www.wi-fi.org...rotected-setup/
- https://docs.google....dFpEUDNSSHZEN3c
- http://en-us-support...s-on-the-router
.The machine has no brain.
......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users