[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Linksys Routers still Vulnerable to Wps vulnerability.



dan,

does the wash tool included with reaver check for advertised config
methods? if not and it does some more in depth analysis to determine if an
ap is vuln,, that might be the active scanner youre looking for.

On Mon, Feb 13, 2012 at 5:27 PM, Derek Grocke <derek@xxxxxxxxxxx> wrote:

> That's definitely not a good thing if it's found to be the case across
> more of the vendors.
> Is it the intent of the of the column on the google docs spreadsheet (WPS
> can be disabled and it stays off), to include confirmation of the retest
> after the WPS setting has been disabled?
>
> I wonder if everyone retested after the option was turned off? I hope so.
>
> Thanks
> Derek
>
>
> On 14/02/2012, at 9:40 AM, chris nelson <sleekmountaincat@xxxxxxxxx>
> wrote:
>
> i believe that disabling wps on router still leaves some routers
> vulnerable was reported on before.
> from
> http://arstechnica.com/business/news/2012/01/hands-on-hacking-wifi-protected-setup-with-reaver.ars
> "Having demonstrated the insecurity of WPS, I went into the Linksys'
> administrative interface and turned WPS off. Then, I relaunched Reaver,
> figuring that surely setting the router to manual configuration would block
> the attacks at the door. But apparently Reaver didn't get the memo, and the
> Linksys' WPS interface still responded to its queries—once again coughing
> up the password and SSID. "
>
> the testing i did was in early-mid jan, ill verify my findings again. at
> work now, but will let you know about config methods.
>
> On Mon, Feb 13, 2012 at 2:57 PM, Dan Kaminsky <dan@xxxxxxxxxxx> wrote:
>
>> That's a fairly significant finding.  Can anyone else confirm the
>> existence of devices that still fall to Reaver even when WPS is disabled?
>>
>> Chris, when you run:
>>
>> iw scan wlan0 | grep “Config methods”
>>
>> Do you see a difference in advertised methods?
>>
>>
>> On Mon, Feb 13, 2012 at 3:58 PM, chris nelson <sleekmountaincat@xxxxxxxxx
>> > wrote:
>>
>>> i have tested reaver on a netgear and linksys (dont have model nos. with
>>> me) with wps disabled and enabled. the wps setting did not matter and both
>>> were vulnerable. was able to recover wpa2 passphrase in ~4 hrs on both.
>>>
>>>
>>>
>>>
>>> On Mon, Feb 13, 2012 at 8:32 AM, Dan Kaminsky <dan@xxxxxxxxxxx> wrote:
>>>
>>>> Steve while he's often derided goes into this very well.  Many cisco's
>>>>> only stop advertising wps when it is "off" but wps actually still
>>>>> exists...which means they are still easily hackable.
>>>>>
>>>>
>>>> Have you directly confirmed a WPS exchange can occur even on devices
>>>> that aren't advertising support?  That would indeed be a quick and dirty
>>>> way to "turn the feature off".
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> Full-Disclosure - We believe in it.
>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>
>>>
>>>
>>
>  _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/