Folks breaking into WEP-encrypted Wi-Fi networks has become a fact of life. That's why most knowledgeable users rely on WPA or WPA2 encryption systems instead. Bad news, though: PC World reports that a pair of security researchers have found a way to break into WPA networks in a frighteningly short amount of time.
According to PC World, Erik Tews and Martin Beck can break WPA Temporal Key Integrity Protocol keys by first getting the router to send them "large amounts of data." Then, the researchers rely on a "mathematical breakthrough" that lets them find a crack in only 12-15 minutes. On the upside, the researchers reportedly haven't found a way to crack keys that secure data going from other systems to the router.
Other WPA cracking techniques already exist, of course, but they're much slower—PC World points out that they hinge on brute-force dictionary cracking, which takes a significant amount of processing power and time as the cracker's system iterates through all possible keys.
Tews and Beck plan to reveal more about their new cracking technique at the PacSec conference in Tokyo next week. PacSec organizer Dragos Ruiu told PC World that Beck has already added "some of the code used in the attack" to the popular Aircrack-ng Wi-Fi cracking tool. (Thanks to TR reader Chris for the heads-up.)
|Samsung's Portable SSD T3 reviewed||7|
|TR BBQ Day Shortbread||15|
|Watch the "second-10th" TR BBQ live in 360 degrees right now||9|
|G.Skill hooks up the TR BBQ with some giveaway goodies||11|
|We threw a Minecraft party to test Samsung's Gear VR headset||9|
|Deals of the week: cheap solid-state storage and more||19|
|Sapphire Nitro+ Radeon RX 480 hot-rods Polaris 10||59|
|AMD gets back in the black with its second-quarter financials||41|
|Nvidia unveils a Pascal-powered Titan X with 11 TFLOPS on tap||176|
|I'll...just review the thin air on my desk where a GTX 1060 would fit, since that's what we have.||+115|