[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] WiFi Protected Setup attack code posted



Is be surprised if anyone related to security actually thought WPS was
remotely safe, bout time some actually released a public tool to brute it
though :P
On Dec 29, 2011 2:02 AM, "Craig Heffner" <cheffner@xxxxxxxxxxxx> wrote:

> Yesterday, Stefan published a paper describing a vulnerability in WPS that
> allows attackers to recover WPA/WPA2 keys in a matter of hours (
> http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/
> ).
>
> Code has been posted to implement the attack:
> http://www.tacnetsol.com/news/2011/12/28/cracking-wifi-protected-setup-with-reaver.html
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/