This is a core protocol-level flaw in WPA2 wi-fi and it looks bad. Possible impact: wi-fi decrypt, connection hijacking, content injection.https://twitter.com/vanhoefm/status/919517772123721728 …
-
Show this thread
-
Replying to @kennwhite
All of this was already possible assuming the attacker knows the wifi password (e.g. w/arp poisoning), which you should generally assume.
1 reply 0 retweets 1 like -
Replying to @RichFelker @kennwhite
Sounds like a new attack to me, how does arp poisoning reveal the WiFi password? Don’t you already need to be on WiFi to send arp packets?
1 reply 0 retweets 1 like -
Replying to @RoganDawes @kennwhite
I said assuming they are on the network/do know the password. This is the norm. It's certainly true for public networks (eg cafes)...
2 replies 0 retweets 0 likes -
...but it's likely for any psk network since *every* device has the pw saved in clear & will reveal it if compromised.
2 replies 0 retweets 0 likes -
Keeping passwords in the clear is a much bigger flaw. What did they think hashes are for?
1 reply 0 retweets 0 likes -
You can't use a password that's hashed (without cracking it) hashing is for pws you need to verify, not ones you need to submit.
1 reply 0 retweets 0 likes
The right way is pubkey but wpa enterprise with pubkey is too much of a pain for users to setup, for too little benefit.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.