Godlike Productions - Conspiracy Forum
Users Online Now: 2,878 (Who's On?)Visitors Today: 943,184
Pageviews Today: 1,401,321Threads Today: 463Posts Today: 7,726
11:19 AM


Rate this Thread

Absolute BS Crap Reasonable Nice Amazing
 

the wsp button is blinking red on the dsl modem!

 
Anonymous Coward
User ID: 33474304
United States
02/01/2013 06:04 PM
Report Abusive Post
Report Copyright Violation
the wsp button is blinking red on the dsl modem!
why is it doing this?
Anonymous Coward (OP)
User ID: 33474304
United States
02/01/2013 06:08 PM
Report Abusive Post
Report Copyright Violation
Re: the wsp button is blinking red on the dsl modem!
the wps button is blinking red! lol
Anonymous Coward
User ID: 32226697
United States
02/01/2013 06:10 PM
Report Abusive Post
Report Copyright Violation
Re: the wsp button is blinking red on the dsl modem!
Death is near.
Anonymous Coward
User ID: 33189921
02/01/2013 06:11 PM
Report Abusive Post
Report Copyright Violation
Re: the wsp button is blinking red on the dsl modem!
[link to en.wikipedia.org]
In December 2011 researcher Stefan Viehböck reported a design and implementation flaw that makes brute-force attacks against PIN-based WPS feasible to perform on WPS-enabled Wi-Fi networks. A successful attack on WPS allows unauthorized parties to gain access to the network. The only effective workaround is to disable WPS.[4]

The vulnerability centers around the acknowledgement messages sent between the registrar and enrollee when attempting to validate a PIN. The PIN is an eight digit number used to add new WPA enrolees to the network. Since the last digit is a checksum of the previous digits,[6] there are seven unknown digits in each PIN, yielding 107 = 10,000,000 possible combinations.

When an enrollee attempts to gain access using a PIN, the registrar reports the validity of the first and second halves of the PIN separately. Since the first half of the pin consists of four digits (10,000 possibilities) and the second half has only three active digits (1000 possibilities), at most 11,000 guesses are needed before the PIN is recovered. This is a reduction by three orders of magnitude from the number of PINs that would have to be tested absent the design flaw. As a result, an attack can be completed in under four hours. The ease or difficulty of exploiting this flaw is implementation dependent, as Wi-Fi router manufacturers could defend against such attacks by slowing or disabling the WPS feature after several failed PIN validation attempts.[3]

A tool has been developed in order to show the attack is practical.[7] The firm that released the tool, Tactical Network Solutions in Maryland, says that it has known about the vulnerability since early 2011 and has been using it.[8]

In some devices, disabling WPS in the user interface does not result in the feature actually being disabled. The device remains vulnerable to attack.[5] Firmware updates have been released for some of these devices so that WPS can be disabled completely.
Anonymous Coward (OP)
User ID: 33474304
United States
02/01/2013 06:19 PM
Report Abusive Post
Report Copyright Violation
Re: the wsp button is blinking red on the dsl modem!
[link to en.wikipedia.org]
In December 2011 researcher Stefan Viehböck reported a design and implementation flaw that makes brute-force attacks against PIN-based WPS feasible to perform on WPS-enabled Wi-Fi networks. A successful attack on WPS allows unauthorized parties to gain access to the network. The only effective workaround is to disable WPS.[4]

The vulnerability centers around the acknowledgement messages sent between the registrar and enrollee when attempting to validate a PIN. The PIN is an eight digit number used to add new WPA enrolees to the network. Since the last digit is a checksum of the previous digits,[6] there are seven unknown digits in each PIN, yielding 107 = 10,000,000 possible combinations.

When an enrollee attempts to gain access using a PIN, the registrar reports the validity of the first and second halves of the PIN separately. Since the first half of the pin consists of four digits (10,000 possibilities) and the second half has only three active digits (1000 possibilities), at most 11,000 guesses are needed before the PIN is recovered. This is a reduction by three orders of magnitude from the number of PINs that would have to be tested absent the design flaw. As a result, an attack can be completed in under four hours. The ease or difficulty of exploiting this flaw is implementation dependent, as Wi-Fi router manufacturers could defend against such attacks by slowing or disabling the WPS feature after several failed PIN validation attempts.[3]

A tool has been developed in order to show the attack is practical.[7] The firm that released the tool, Tactical Network Solutions in Maryland, says that it has known about the vulnerability since early 2011 and has been using it.[8]

In some devices, disabling WPS in the user interface does not result in the feature actually being disabled. The device remains vulnerable to attack.[5] Firmware updates have been released for some of these devices so that WPS can be disabled completely.
 Quoting: Anonymous Coward 33189921


thats not good there was a suspicious car driving through the neighborhood!
Anonymous Coward
User ID: 33492944
United States
02/02/2013 12:33 AM
Report Abusive Post
Report Copyright Violation
Re: the wsp button is blinking red on the dsl modem!
[link to en.wikipedia.org]
In December 2011 researcher Stefan Viehböck reported a design and implementation flaw that makes brute-force attacks against PIN-based WPS feasible to perform on WPS-enabled Wi-Fi networks. A successful attack on WPS allows unauthorized parties to gain access to the network. The only effective workaround is to disable WPS.[4]

The vulnerability centers around the acknowledgement messages sent between the registrar and enrollee when attempting to validate a PIN. The PIN is an eight digit number used to add new WPA enrolees to the network. Since the last digit is a checksum of the previous digits,[6] there are seven unknown digits in each PIN, yielding 107 = 10,000,000 possible combinations.

When an enrollee attempts to gain access using a PIN, the registrar reports the validity of the first and second halves of the PIN separately. Since the first half of the pin consists of four digits (10,000 possibilities) and the second half has only three active digits (1000 possibilities), at most 11,000 guesses are needed before the PIN is recovered. This is a reduction by three orders of magnitude from the number of PINs that would have to be tested absent the design flaw. As a result, an attack can be completed in under four hours. The ease or difficulty of exploiting this flaw is implementation dependent, as Wi-Fi router manufacturers could defend against such attacks by slowing or disabling the WPS feature after several failed PIN validation attempts.[3]

A tool has been developed in order to show the attack is practical.[7] The firm that released the tool, Tactical Network Solutions in Maryland, says that it has known about the vulnerability since early 2011 and has been using it.[8]

In some devices, disabling WPS in the user interface does not result in the feature actually being disabled. The device remains vulnerable to attack.[5] Firmware updates have been released for some of these devices so that WPS can be disabled completely.
 Quoting: Anonymous Coward 33189921


thats not good there was a suspicious car driving through the neighborhood!
 Quoting: Anonymous Coward 33474304


shitstir2shockeduhoh
Anonymous Coward
User ID: 33484543
United States
02/02/2013 12:35 AM
Report Abusive Post
Report Copyright Violation
Re: the wsp button is blinking red on the dsl modem!
Death is near.
 Quoting: Anonymous Coward 32226697


hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhaaaaaaaaaaa