Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.internet.wireless    |    Fun with wireless Internet access    |    55,960 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 54,355 of 55,960    |
|    harry newton to He who is Colonel Edmund J. Burke    |
|    Re: Severe flaw in WPA2 protocol leaves     |
|    16 Oct 17 14:01:00    |
      XPost: alt.home.repair, microsoft.public.windowsxp.general       From: harry@is.invalid              He who is Colonel Edmund J. Burke said on Mon, 16 Oct 2017 06:54:13 -0700:              > Go eat some dog turds, you god damned fucking nigger!              Back on topic, the weaknesses are in the Wi-Fi standard itself, and not in       individual products or implementations.              Therefore, any correct implementation of WPA2 is likely affected. To       prevent the attack, users must update affected products as soon as security       updates become available.              If your device supports Wi-Fi, it is most likely affected.              Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are       all affected by some variant of the attacks.              The research behind the attack will be presented at the Computer and       Communications Security (CCS) conference, and at the Black Hat Europe       conference. Our detailed research paper can already be downloaded.              DEMONSTRATION       As a proof-of-concept we executed a key reinstallation attack against an       Android smartphone.              In this demonstration, the attacker is able to decrypt all data that the       victim transmits. For an attacker this is easy to accomplish, because our       key reinstallation attack is exceptionally devastating against Linux and       Android 6.0 or higher.              This is because Android and Linux can be tricked into (re)installing an       all-zero encryption key (see below for more info). When attacking other       devices, it is harder to decrypt all packets, although a large number of       packets can nevertheless be decrypted.              In any case, the following demonstration highlights the type of information       that an attacker can obtain when performing key reinstallation attacks       against protected Wi-Fi networks:              Any data or information that the victim transmits can be decrypted.              Additionally, depending on the device being used and the network setup, it       is also possible to decrypt data sent towards the victim (e.g. the content       of a website).              Although websites or apps may use HTTPS as an additional layer of       protection, we warn that this extra protection can (still) be bypassed in a       worrying number of situations. For example, HTTPS was previously bypassed       in non-browser software, in Apple's iOS and OS X, in Android apps, in       Android apps again, in banking apps, and even in VPN apps.              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca