Folks breaking into WEP-encrypted Wi-Fi networks has become a fact of life. That's why most knowledgeable users rely on WPA or WPA2 encryption systems instead. Bad news, though: PC World reports that a pair of security researchers have found a way to break into WPA networks in a frighteningly short amount of time.
According to PC World, Erik Tews and Martin Beck can break WPA Temporal Key Integrity Protocol keys by first getting the router to send them "large amounts of data." Then, the researchers rely on a "mathematical breakthrough" that lets them find a crack in only 12-15 minutes. On the upside, the researchers reportedly haven't found a way to crack keys that secure data going from other systems to the router.
Other WPA cracking techniques already exist, of course, but they're much slower—PC World points out that they hinge on brute-force dictionary cracking, which takes a significant amount of processing power and time as the cracker's system iterates through all possible keys.
Tews and Beck plan to reveal more about their new cracking technique at the PacSec conference in Tokyo next week. PacSec organizer Dragos Ruiu told PC World that Beck has already added "some of the code used in the attack" to the popular Aircrack-ng Wi-Fi cracking tool. (Thanks to TR reader Chris for the heads-up.)
|Aerocool starts Project 7 with a flurry of case and cooling gear||5|
|NTFS filesystem bug could crash Windows 7, 8, and 8.1||36|
|Enermax NeoChanger is both a pump and a reservoir||13|
|Acer sprinkles the Iconia Tab 10 with quantum dots||8|
|Deals of the week: lots of motherboards and a cheap GTX 1080||20|
|MSI Vortex G25VR, Infinite-A, and Pro 20EX PCs fill all niches||2|
|Nvidia unveils the GeForce GTX Battlebox certification program||31|
|Acer Spin 1 and Nitro 5 laptops are ready for school season||13|
|Ryzen AGESA 22.214.171.124 exposes more memory overclocking options||66|
|Nah, giving it up with no resistance is downloading Chrome.||+8|