It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Why does everything need to be broken? Why can't people who work out how to break things also work out how to fix them?
Reaver performs brute force attacks against Wifi Protected Setup (WPS) registrar PINs to recover the WPA/WPA2 passphrase. Since many router manufacturers and ISPs turn on WPS by default a lot of routers are vulnerable to this attack out of the box.
originally posted by: Terminal1
Just a question...
I live out in the country and have a router and a repeater set up to cover all the buildings on my property.
I leave the WiFi open because my kids and grandkids, as many as there are, someone is always bringing a new device or gaming system.
I figure that since I am fairly isolated I would be able to see anyone coming towards the house to get into range of my wifi.
Am I wrong in thinking this way?
Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up side-band electromagnetic emissions from electronics devices that correlate to hidden signals or data for the purpose of recreating these signals or data in order to spy on the electronic device.
Side-band electromagnetic radiation emissions are present in and, with the proper equipment, can be captured from keyboards, computer displays, printers, and other electronic devices.
TEMPEST is a National Security Agency specification and a NATO certification [1][2] referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.[3] TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).[4]
originally posted by: Aazadan
a reply to: DanteGaland
That particular technique only works on CRT monitors, and even then it never generated the resoution needed to read text. At best you could get blurry images from it.
originally posted by: Apollumi
It's why our company laptops could only route (default route) through an IPSEC vpn tunnel. All of the traffic was encrypted back to the main office and then it went through Websense and an IDS/IPS before it ever went to the Internet. This introduced some additional latency for non office traffic but better safe than sorry. It means I did not have to worry about anything in between.
For the home user they have private VPN services if you want to pony up. Although you can get it free if you look around a small bit.
originally posted by: Cofactor
a reply to: Terminal1
I figure that since I am fairly isolated I would be able to see anyone coming towards the house to get into range of my wifi.
Wrong assumption! Since you are fairly well isolated, reception of your signal is not degraded by hundreds of nearby WiFi masking your transmission. With a very high gain antenna and line of sight, even of scatter signal from top of electric pole, it is possible to connect at you from kilometers aways! I would bet that you installed your antennas with high elevation above ground and with high power to cover your domain, extremely usefull for long range interception.
originally posted by: Jonjonj
originally posted by: Agit8dChop
The security protocol used to protect the vast majority of wifi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according to the researcher who discovered the weakness.
Mathy Vanhoef, a security expert at Belgian university KU Leuven, discovered the weakness in the wireless security protocol WPA2, and published details of the flaw on Monday morning.
“Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted,” Vanhoef’s report said. “This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos and so on.
www.theguardian.com...
Boom... Nearly ever WIFI Network around the world uses WPA2 because it was so secure.
Now the cats out of the bag...
Vanhoef emphasised that “the attack works against all modern protected wifi networks.
Going to be a interesting few days at the office me thinks!
Few specifics for those interested:
www.krackattacks.com...
I guess at some point, just NOT trying to hack something will become vogue, right?
I mean it is ridiculous that it seems to be the goal of every single stinky pepperhat to just bust up the security of absolutely anything at all.
WHY???
Why does everything need to be broken? Why can't people who work out how to break things also work out how to fix them?
DAMN!!!
Exactly! The best network if you wanted to cover a large area would be 20 cheap devices, each covering 15' radius, instead of a few high power transmitters covering 300-500ft radius. The latter could be intercepted from 2-3 miles away while the 15' radius might be be able to be intercepted from 300ft (weather plays a big role in this - such as humidity, temp, rain/snow, etc).
MOST people are to dumb to even turn OFF WPS (Wifi Protected Setup) anyway.
There is a Linux distribution called Kali Linux. It is basically a penetration-testing toolset. It contains several tools that can be deployed against wireless networks, including those protected with WPA2.