reaver is the linux tool used to implement a brute force attack against wi-fi protected setup...

10
Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases.

Upload: sebastian-webster

Post on 26-Mar-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases.

Page 2: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

Since 2007 the Wi-Fi Alliance provided industry wide setup solutions for home and small business environments.

Allows for typical users with little knowledge of wireless configurations and security settings to configure a new wireless network.

Page 3: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

By default (out-of-the-box) WPS is always active on all devices.

WPS is marketed as being secure, however newly discovered design and implementation flaws allow attackers to gain access.

Allows users to enter an 8 digit PIN to connect to a secured network without having to enter a passphrase.

When the user supplies the correct PIN the access point essentially gives the user the WPA/WPA2 PSK that is needed to connect to the network.

Page 4: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

User pushes a button on both the Access Point and new wireless device (e.g. printer, PC, NIC)

Page 5: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

Internal Registrar User enters WPS PIN of the Wi-Fi

adapter into the web interface of the Access Point.

External Registrar User enters WPS PIN of the Access

Point into the client device (e.g. PC, laptop)

Page 6: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

Is a WPA attack tool developed by Tactical Network Solutions that exploits a protocol flaw in the Wi-Fi Protected Setup (WPS).

This vulnerability exposes a side-channel attack against Wi-Fi Protected Access (WPA) versions 1 and 2 allowing the extraction of the Pre-Shared Key (PSK) used to secure the network.

Determine an Access Point's PIN and then extract the PSK and give it to the attacker.

Page 7: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

An authentication attempt can take between 0.5 and 3 seconds to complete.

Once the PIN of the Access Point has been discovered the Access Point then hands the requesting device the passphrase.

Page 8: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

Cisco/Linksys

Netgear

D-Link

Belkin

Buffalo

ZyXEL

Technicolor

Page 9: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

Disable WPS, however this may not be available on all devices.

Page 10: Reaver is the Linux tool used to implement a Brute Force Attack against Wi-Fi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases

Tactical network solutions. (2011). Retrieved from http://www.tacnetsol.com/products