• Security flaw in WiFi Protected Setup

    Author
    Topic
    #480706

    A security flaw in the WiFi Protected Setup (WPS) system has been uncovered and publicly disclosed.

    Researcher Stefan Viehböck has published a PDF summary of his work here and an article about it also appears in The Register. Due to both design and implementation flaws in the WPS standard, most WPS enabled routers can be brute force attacked in around 2 hours. By brute forcing the router in this way, a secure connection is established and the victim’s network becomes penetrated.

    Both Viehböck and US-CERT recommend that users disable push-button WPS until a firmware upgrade is available from manufacturers.

    Viewing 1 reply thread
    Author
    Replies
    Viewing 1 reply thread
    Reply To: Security flaw in WiFi Protected Setup

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: