<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>wi-fi security Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/wi-fi-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Tue, 07 Aug 2018 13:48:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Simplified WPA/WPA2 Password Crack on 802.11 Networks</title>
		<link>https://www.osradar.com/simplified-wpa-wpa2-password-crack-on-802-11-networks/</link>
					<comments>https://www.osradar.com/simplified-wpa-wpa2-password-crack-on-802-11-networks/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 13:48:26 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[router password]]></category>
		<category><![CDATA[router protection]]></category>
		<category><![CDATA[router security]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[wireless security]]></category>
		<category><![CDATA[wpa]]></category>
		<category><![CDATA[wpa obsolete]]></category>
		<category><![CDATA[wpa security]]></category>
		<category><![CDATA[wpa2]]></category>
		<category><![CDATA[wpa2 obsolete]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=5200</guid>

					<description><![CDATA[<p>Wi-Fi is one of the most important parts of our everyday life where we can share our internet connection, files and more. In fact, it’s become a standard for our internet connection, right? As it’s important, the security is also quite important. Recently, a new technique was discovered using which the PMKID (Pairwise Master Key [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/simplified-wpa-wpa2-password-crack-on-802-11-networks/">Simplified WPA/WPA2 Password Crack on 802.11 Networks</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wi-Fi is one of the most important parts of our everyday life where we can share our internet connection, files and more. In fact, it’s become a standard for our internet connection, right? As it’s important, the security is also quite important.</p>
<p>Recently, a new technique was discovered using which the PMKID (Pairwise Master Key Identifier) from a router using WPA/WPA2 security can be retrieved easily. Using it, it’s easy to crack the wireless password of the router. Until this discovery, it would require an attacker to wait for a user to log into a network and capture a full authentication handshake. This new method allows the breach with only a single frame which the attacker can request from the access point just because it’s a regular part of the protocol.</p>
<h1>The new method</h1>
<p><img loading="lazy" class="size-full wp-image-5202 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking.jpg" alt="" width="3750" height="3750" srcset="https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking.jpg 3750w, https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking-150x150.jpg 150w, https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking-300x300.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking-768x768.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking-1024x1024.jpg 1024w, https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking-696x696.jpg 696w, https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking-1068x1068.jpg 1068w, https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking-420x420.jpg 420w, https://www.osradar.com/wp-content/uploads/2018/08/new-method-password-cracking-1920x1920.jpg 1920w" sizes="(max-width: 3750px) 100vw, 3750px" /></p>
<p>This new method was discovered by Jens &#8220;atom&#8221; Steube – the developer of the popular password cracking tool Hashcat when looking for new ways to crack WPA3 wireless security protocol. According to Steube, this method is able to work against all the routers that use 802.11i/p/q/r networks with roaming (enabled).</p>
<p>This method extracts the RSN IE (Robust Security Network Information Element) from a single EAPOL frame. The RSN IE is the optional field that contains the PMKID that the router generates when a user tries to authenticate.</p>
<p>If you didn’t know, this PMK is a crucial part of the 4-way handshake in-between the client and the router that ensures that the client knows the wireless password (PSK – Pre-shared Key) of that network.</p>
<p>For knowing in details the procedures of the hacking, <a href="https://hashcat.net/forum/thread-7717.html">head to Steube’s poast on Hashcat forum</a>.</p>
<h1>How long to crack the WPA/WPA2 wireless key?</h1>
<p><img loading="lazy" class="size-full wp-image-5203 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/how-long-password-crack.jpg" alt="" width="768" height="512" srcset="https://www.osradar.com/wp-content/uploads/2018/08/how-long-password-crack.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/08/how-long-password-crack-300x200.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/08/how-long-password-crack-696x464.jpg 696w, https://www.osradar.com/wp-content/uploads/2018/08/how-long-password-crack-630x420.jpg 630w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>Well, the method that Steube discovered makes it relatively a lot easier to get your hand on that hash that contains the PSK, but cracking the hash is still a thing. Depending on the complexity of the password, the time for cracking the key is still a long time.</p>
<p>Unfortunately, many users don’t change the default password that comes up with the router and they seem not eager to do so. In fact, in cases they even lack the technical knowledge to perform the action. According to Steube, if the users continue to use the manufacturer generated PSK, it makes it relatively easy to perform the attack on a large group of WPA users.</p>
<p>Certain manufacturers create password that are easily determinable. Using programs Hashcat, the cracking of the password is just a matter of time. Steube states that the AP mac address and the pattern of the ESSID allows an attacker to even identify the manufacturer of the router without having physical access to it. A typical manufacturer PSK of length 10 characters can take up to 8 days to crack on a 4 GPU box. That’s too fast, to be honest!</p>
<h1>Protecting your router from being cracked</h1>
<p><img loading="lazy" class=" wp-image-5204 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/protect-your-router.jpg" alt="" width="662" height="364" srcset="https://www.osradar.com/wp-content/uploads/2018/08/protect-your-router.jpg 600w, https://www.osradar.com/wp-content/uploads/2018/08/protect-your-router-300x165.jpg 300w" sizes="(max-width: 662px) 100vw, 662px" /></p>
<p>For properly safeguarding your router, it’s time that you take action to make it safe. It’s not something big, rocket science; all you have to do is change the password! Depending on the manufacturer of your router, you can find out lots of useful tutorials on changing your password. Don’t forget to use a strong one! <a href="https://lastpass.com/howsecure.php">Check out if your password is strong on LastPass</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/simplified-wpa-wpa2-password-crack-on-802-11-networks/">Simplified WPA/WPA2 Password Crack on 802.11 Networks</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/simplified-wpa-wpa2-password-crack-on-802-11-networks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WPA3 – The Promise of Security</title>
		<link>https://www.osradar.com/wpa3-the-promise-security/</link>
					<comments>https://www.osradar.com/wpa3-the-promise-security/#comments</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Wed, 10 Jan 2018 03:46:01 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[WPA2 fix]]></category>
		<category><![CDATA[WPA3]]></category>
		<category><![CDATA[WPA3 protocol]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1141</guid>

					<description><![CDATA[<p>Wi-Fi is the most used tech in our everyday life. From our desktops, laptops to smartphones – all connect to the internet via the routers using Wi-Fi. For personal/corporate wireless usage, Wi-Fi is the best of all. Unfortunately, in the year of 2017, several serious bugs were found in, threatening the security of the web. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/wpa3-the-promise-security/">WPA3 – The Promise of Security</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wi-Fi is the most used tech in our everyday life. From our desktops, laptops to smartphones – all connect to the internet via the routers using Wi-Fi. For personal/corporate wireless usage, Wi-Fi is the best of all. Unfortunately, in the year of 2017, several serious bugs were found in, threatening the security of the web. Now, developers are working on a better, safer and tighter security suite for Wi-Fi protection – WPA3.</p>
<h2>How Wi-Fi works</h2>
<p>Wi-Fi works using radio wave signals that emit around. Anyone intercepting those signals can read the data. That’s why security measures were taken to ensure that data transmission is protected. The security protocol was called WPA2. WPA2 is an expansion of WPA (Wi-Fi Protected Access) that provided improved and powerful data encryption and data transfer.</p>
<p>Wi-Fi transmitted data encrypted with a unique encryption key per device. WPA2 used a method called “4-way handshake” with the client device to determine the encryption key. Unfortunately, it had a serious flaw in the mechanism, discovered in October 2017. This serious bug, codenamed “KRACK”, simply broke Wi-Fi. KRACK allowed hacked to access user data without any access to the Wi-Fi network. Fortunately, companies like Microsoft, Google, and Apple patched the bug in their software.</p>
<h2>Why we need WPA3</h2>
<p>With so many bugs, WPA2 is really obsolete. The Wi-Fi Alliance, a clutch of companies who certify products as capable of data transmission over Wi-Fi, is working on an improved security protocol, called WPA3.</p>
<p>This is a big switch. WPA2 has been around for 14+ years! That’s a very old protocol. Now, we’re on our way to WPA3. There’s been tons of new features and advanced methods included to ensure the top-notch security and robust performance.</p>
<h2>What’s inside WPA3?</h2>
<p>Let’s take a look.</p>
<ul>
<li>Better handshake method. The previous “4-way handshake” contained severe flaws. Now, the new, improved handshake method will provide impenetrable security.</li>
<li>A better &amp; simplified process for configuring security for devices having limited/no display interface.</li>
<li>Robust protection without following the typical password complexity recommendation.</li>
<li>A 192-bit security suite connected with CNSA (Commercial National Security Algorithm) to ensure even stronger security.</li>
<li>Improved protection against brute-force attack. This attack tries every possible combination to get access to the access point. New security measure will block an attacker after many failed password guesses.</li>
<li>Individualized data encryption to scramble the connection between each device on the network and the router. This will ensure that no one can manipulate data.</li>
<li>Fixes to common Wi-Fi issues. Wi-Fi currently contains a number of security issues that need to be taken into account when accessing any public Wi-Fi. WPA3 seeks to fix these issues.</li>
</ul>
<p>WPA2 is pretty old for the current age. WPA3 is on its way. However, it’s not anytime soon. WPA3 enabled devices might be available later this year. What about the present devices? Unfortunately, it’s at the mercy of the manufacturers. It&#8217;s unknown if current devices can apply WPA3 protocol via the firmware update, but there’s a scope for it.</p>
<p>We all are waiting for the new WPA3 standard. Security is a serious issue now, and improved protection methods are the only way to ensure protection against critical vulnerabilities.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/wpa3-the-promise-security/">WPA3 – The Promise of Security</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/wpa3-the-promise-security/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
