Full Disclosure mailing list archives
WiFi Protected Setup attack code posted
From: Craig Heffner <cheffner () devttys0 com>
Date: Wed, 28 Dec 2011 16:00:36 -0500
Yesterday, Stefan published a paper describing a vulnerability in WPS that allows attackers to recover WPA/WPA2 keys in a matter of hours ( http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability/ ). Code has been posted to implement the attack: http://www.tacnetsol.com/news/2011/12/28/cracking-wifi-protected-setup-with-reaver.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- WiFi Protected Setup attack code posted Craig Heffner (Dec 29)
- Re: WiFi Protected Setup attack code posted Gage Bystrom (Dec 29)
- Re: WiFi Protected Setup attack code posted Dan Kaminsky (Dec 29)
- Re: WiFi Protected Setup attack code posted Gage Bystrom (Dec 29)