Feeds

Wireless network security weakness to demo at DEFCON

Et tu, WPA2?

The Power of One eBook: Top reasons to choose HP BladeSystem

Security researchers have discovered security shortcomings in the WPA2 protocol that threaten the security of wireless networks, even if they are running up-to-date security software.

The hack involves generating arbitrary broadcast packets from a spoofed node that trick legitimate nodes in a targeted network into responding with queries that give away information about their secret keys. The traffic does not, of course, give away the private key directly, but it does provide enough clues for this information to be extracted by subsequent cryptanalysis and high-end number crunching.

The attack was discovered by wireless security experts at AirTight Networks, who found it was possible to spoof the MAC address of a kosher access point by adding just 10 lines of code to the open source Madwifi driver and running this software on a standard PC, H Security reports. However, for the attack to succeed, hackers already need to be internal, authorised users of targeted networks.

WPA2 (Wi-Fi Protected Access 2) is the strongest security algorithm for wireless network currently available. It's already widely used in enterprises and increasingly popular in Wi-Fi hotspots. WPA2 is the successor to the earlier WPA standard, which itself followed WEP (Wired Equivalent Privacy), an amateurish first stab at wireless security that was riddled with serious security holes and easy to break right from the start.

The comparatively minor security shortcomings of WPA2 – which are more at interested to cryptographic security researchers than would-be wireless hackers – stem from security holes in IEEE 802.11 standard rather than implementation bugs. Although not suitable for external hackers the security flaw does present plenty of scope for mischief, according to a pre-talk advisory from AirTight, chiefly as a potential way to spy on supposedly encrypted traffic or to plant malware.

Exploiting the vulnerability, an insider can bypass WPA2 private key encryption and authentication to sniff and decrypt data from other authorized users as well as scan their Wi-Fi devices for vulnerabilities, install malware and possibly compromise those Wi-Fi devices.

Sohail Ahmad, senior wireless security researcher for AirTight Networks, is due to demo his findings at the Black Hat and later DEFCON18 conferences in Las Vegas this week. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.