Wifi Security main page Contact us Facebook english version cz verze
News
obrazek_novinka

From wireless networks security area

WPS vs. reaver-wps -> another danger in wireless network area!

11/11/2012

WPS technology that was originally used to simplify setting up Wi-Fi router for absolute beginners, suffers from a huge shortage in the actual design. The vast majority of wireless user can set a strong password, but that is useless just because this technology. An attacker with the appropriate amenities (WiFi card that supports packet injection) finds using tool called 'wash' appropriate network in the area and then you just turn the Linux tool called Reaver-wps from Craiga Heffner, which is downloable for free here: code.google.com. The actual obtaining a key to the network takes approximately 4 to 10 hours depending mainly on the signal.

The biggest danger is in wifi routers models which can't off WPS service! However, if in your case possible, these improvements as soon as possible to turn off!

  • Technical specifications and details of the attack are freely available in PDF (EN) here.
  • A video that demonstrates the attack on WPS-enabled network can be viewed here vimeo.com.

VOIP = back door open!

3/12/2011

If you are a user who purchased a new wifi router, it is very likely except that the network name of your choice you have captured a new network called VOIP. In the event that you do not use a VOIP network equipment supplied eg. ISP setting the enclosed manual is very likely that in parallel transmissions VOIP network you will soon receive foreign invaders.

The fundamental error is to leave the device in the default settings, VOIP uses the WEP encryption inappropriate. If your network is not using VOIP ideal option to turn it off. If you use this network for Internet telephony is suitable in terms of network security encryption set to a higher level - such as WPA-PSK (if this option supports end-device). password in the network VOIP is because In the default setting, your physical address (MAC address) with one zero on In addition, beginning , thus most easily observable data!

If you have any questions about setting up your device, or other issues related to VOIP use the contact form.
TKIPtun-ng, why not use WPA-TKIP!
11/26/2011
Linux tool TKIPtun-ng package from Aircrack presents a danger to the user using WPA-PSK encryption. tool is still in the development for non-specialists and no support. Yet on the package Aircrack-ng simple example of using the network. It is clear that Unlike previous types of attacks on WPA-PSK, this kind of attack does not require a dictionary (s).
The disadvantage of utility, however, is the need to have a destination network QoS enabled.

Source: airdump.cz
Public Wireless Network? No!
11/25/2011
In our neighborhood is already extremely high number of sites where it is possible to connect to public wifi networks (such as in coffee shops). The basic issue of public networks is their safety - notably through because the network can connect to each. These networks are mostly without any form of security and thus are ideal for users who want to intentionally harm or alienate foreign data. Users with these intentions use specialized programs for monitoring packets the network (e.g. WifiZoo), which are often readily available! It is therefore very dangerous in these networks, for example, subscribe to e-mails or on social networks. If you must use a network of this kind should have a running program with the function of isolation WiSE and also to choose the ideal network with encryption least "WEP".
"Using a wireless connection in public areas (hotspots) brings with it the greatest risk in terms of loss of privacy and sensitive data"
JavaScript