Wi-Fi Protected Setup made easier to brute force

    Date29 Dec 2011
    4134
    Posted ByDave Wreski
    A researcher has found design flaws and poor implementation in WPS (Wi-Fi Protected Setup) which makes it much simpler to brute force the protection on Wi-Fi access points that use the technology. The discovery has prompted the US CERT to issue an advisory which suggests disabling WPS as a workaround for the problem. WPS simplifies the process of connecting a device to the Wi-Fi network by pushing a button to start the authentication, entering a PIN number from the new client into the access point, or entering an eight digit PIN number (usually printed on the device) from the access point to configure the connection. It is the last of these connections, known as "external registrar" or wps_reg, that researcher Stefan Viehb
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com page/section?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    20
    radio
    [{"id":"73","title":"News","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"74","title":"Advisories ","votes":"4","type":"x","order":"2","pct":80,"resources":[]},{"id":"75","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"76","title":"Latest Features ","votes":"1","type":"x","order":"4","pct":20,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.