Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not that alone. They show that that is "practical", which may be semi-new, but the main trick:

" it is the de-authentication step in the wireless setup that represents a much more accessible entry point for an intruder with the appropriate hacking tools. As part of their purported security protocols routers using WPA2 must reconnect and re-authenticate devices periodically and share a new key each time. The team points out that the de-authentication step essentially leaves a backdoor unlocked albeit temporarily."



I take offence to their statement "leaves a backdoor unlocked". It's no such thing. The de-auth step merely saves you the time of having to wait for the client/ap to renegotiate on their own. Even if your de-auth step is successful, you still have to conduct a brute force against the handshake you captured. Nothing, at any time, is unlocked.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: