โFeb-14-2015 11:59 AM
โFeb-16-2015 05:47 AM
SCVJeff wrote:
If you claim to have cracked WPA, you might take that to Def Con and report how you did it, because the smartest hackers in the world haven't figured it out yet. WEP and WPA anything are two completely animals and the tools are also completely different. WEP can be discovered with Wire Shark, not so with WPA because
there are no "tools" to decrypt it. It hasn't been done.
โFeb-16-2015 04:01 AM
โFeb-15-2015 07:10 PM
โFeb-15-2015 06:19 PM
โFeb-15-2015 02:04 PM
LittleBill wrote:If you claim to have cracked WPA, you might take that to Def Con and report how you did it, because the smartest hackers in the world haven't figured it out yet. WEP and WPA anything are two completely animals and the tools are also completely different. WEP can be discovered with Wire Shark, not so with WPA becausefj12ryder wrote:
Yeah, there's a lot of "proof of concept" that is demonstrated, but a lot of the exploits require certain steps be performed before it actually works. Yeah, it works in the lab, but not so much in the wild.
I'm not saying that WPA2 can't be broken, but I am saying that it isn't trivial.
folks, you can crack WPA2 in almost the exact same ways as WEP was cracked with the same tools. the difference is it takes considerably longer to do, not harder just longer. the downside is, once have you have th handshake, you can go somewhere else to brute force it. with WEP the standard attack required being in range of the AP.
you don't need a lab at all. i have cracked my WPA2 password using the same tools i used to crack my WEP password back in the day. this is why they tell you to use a good password.
โFeb-15-2015 11:49 AM
LittleBill wrote:Longer as in hours, days, weeks, years? Possible, but is it actually doable with a long, 20 digits long, password?fj12ryder wrote:
Yeah, there's a lot of "proof of concept" that is demonstrated, but a lot of the exploits require certain steps be performed before it actually works. Yeah, it works in the lab, but not so much in the wild.
I'm not saying that WPA2 can't be broken, but I am saying that it isn't trivial.
folks, you can crack WPA2 in almost the exact same ways as WEP was cracked with the same tools. the difference is it takes considerably longer to do, not harder just longer. the downside is, once have you have th handshake, you can go somewhere else to brute force it. with WEP the standard attack required being in range of the AP.
you don't need a lab at all. i have cracked my WPA2 password using the same tools i used to crack my WEP password back in the day. this is why they tell you to use a good password.
โFeb-15-2015 11:21 AM
โFeb-15-2015 11:05 AM
fj12ryder wrote:
Yeah, there's a lot of "proof of concept" that is demonstrated, but a lot of the exploits require certain steps be performed before it actually works. Yeah, it works in the lab, but not so much in the wild.
I'm not saying that WPA2 can't be broken, but I am saying that it isn't trivial.
โFeb-15-2015 10:37 AM
โFeb-15-2015 10:25 AM
fj12ryder wrote:Its not.. This was a big deal at DefCon a few years ago, and once you watch and get into what happened, it was written only for Mac, and if I remember, they also installed spyware to mine for it and report back. Just as easy, maybe more so on the PC, except the PC has been so vulnerable that most windows machines are running spyware. Not so with the Mac, but it's coming. Until I actually watch someone capture, decode, and read it back to me, I ain't buying that it's broke.
"Not exactly a cover-up, but more "security through obscurity" - the fact WPA/WPA2 is broken is just not widely advertised." WPA yes, WPA2 not yet.
Personally, I think if it were easily broken it would be all over the net, just because someone is determined to tell people. If it came out on a RV forum, I would think it'd be common knowledge on any network forum. I guess I'll wait for official word on the vulnerability of WPA2.
โFeb-15-2015 09:53 AM
โFeb-15-2015 09:31 AM
fj12ryder wrote:
Gosh, if it is so easy how does anything stay secure? Maybe it isn't quite as easy as it is purported to be. You'd think there would be security breaches every day in every sector, but it doesn't seem to be happening.
Oh, oh, don't tell me: it's a coverup.
โFeb-15-2015 08:46 AM
โFeb-15-2015 08:42 AM
rwbradley wrote:Too funny! I guess if you use enough buzzwords you'll fool everyone. That is "so 10 years ago". ๐SCVJeff wrote:fj12ryder wrote:x2-10
"Some enterprising entrepreneurs have already run all the password combinations and filed those results into a nice easy searchable database."
Seriously? You do realize that a 20 digit password, which is what I use, has trillions of combinations. And they have that in "a nice easy searchable database". Man, that must be some database.
The misinformation in this thread is amazing.
If someone is interesting in attempting to get into my home router or myfi, PM me and I'll send you the 1st 10 characters, maybe 20. You will be no further along in two years than starting from scratch.
Ah shucks, maybe its on the "list"...
You are right, there is a lot of misinformation. Hacking passwords is so 10 years ago. So you can go grab a 50GB torrent and run a password hash thru the rainbow tables. It may or may not work depending on the encryption, sometimes in minutes sometimes in years. Hiding in an Onion network is so 5 years ago. Onion networks are only secure on the inside, the entry point and exit point are not, it is also easy to hack the device before the data enters the Onion, put up fake relay servers, apps also leak data while in the Onion all the time. How do you think they got the owner of Silk Road. If I wanted into someone's computer, router, MIFI, phone etc. I would not try to hack the password. Nearly anyone is vulnerable, and don't let them tell you otherwise. It is simple to steal session cookies and Kerberos tokens to impersonate someone else with no password required. It is also really easy to use a known exploit (or even one the hardware manufacturers don't know about yet) to trick the router, computer, server etc. to give you administrative rights, no password required. How do you think Evernote, PlayStation network, Sony Pictures, Home Depot, Target etc. got hacked. They did not get into these networks by hacking someone's password! Strong passwords help, but do not be fooled into thinking you are too secure to be hacked, look at it on a scale, you are more or less secure than the next guy but we are all vulnerable.