WPA and WPA2 cracked 100 times faster



The days of relying on WPA or WPA2 as your online layer of wireless security may be numbered. A new technique that makes use of NVIDIA’s newer GPU’s to do some of hte processing means that it’s possible to break “forgotten” keys about 100 times faster than was previously possible. This means a key could be broken in days or weeks instead of years. The distributed password recovery software is available here. I think there are a lot of misconceptions about WEP and WPA/WPA2 that we ought to rethink.

I know some people may be thinking about moving back to the wired network instead (some may have not yet moved to wireless.)

I’ve made it common practice to use a vpn connection in to my openvpn server box (which is a dd-wrt linksys wrt54gl ). The reason I do this is because I typically make use of public wireless connections and some of them use wpa or wpa2. What’s interesting to me is that so many people think that just because you’re on a shared network with 20-30 other people and you’re all using the same WPA2 key then your data is secure. What most people don’t realize is that anyone else with the key will be able to access all your networked data. i.e. ANY unencrypted data passing over the wireless is going to be visible to ANYONE that has the key. So, do you trust the people over at the next table? the back corner? down the hall?

So… I would suggest that in using wireless you use a vpn encrypted connection “just in case”.

Related Posts

Blog Traffic Exchange Related Posts
  • What a week.... I think it's time to pass along a long story of what's gone on over the last week or so here and some of the reasons there hasn't been anything posted. Generally, I would say that work has been busy, but something happened last week that went a bit beyond......
  • Wireless exploits coming to Metasploit 3... and the script kiddies rejoiced... It reads as though Metasploit 3 will make it easier than ever for script kiddies everywhere to take full advantage of the local wireless hotspots. Of course, metasploit has it's good uses by people legitimately testing systems that they are responsible for, for vulnerabilities. But,......
  • The problems with cache servers Networkworld brings us this report that exploit code removed from websites can live on for quite a while in caching servers. Which, in a way is NOT news, but it's worth remembering. Many times when someone visits a website, their really visiting a caching proxy server that has previously grabbed......
Blog Traffic Exchange Related Websites
  • Ways To Target Traffic To Your Website If you run an online business, it is only a must for you to think of targeting traffic. After all, you need to rank in the search engines for your business to become more visible to the public. However, the rankings change every minute of the day and that......
  • Your Belief Systems Govern How You Related To Life People have asked me why it is so important to look at your belief systems, and is having belief systems negative? Belief systems are not intrinsically good or bad; however, they can, and often do have a great impact on your life. Belief systems govern how the mind functions,......
  • Methods of Locating Anyone I am Familiar With Online Due to people’s need and desire to communicate there are a lot of us that are always searching for people that we might possibly know on the net and perhaps get in touch with them.Go through all the means to locate someone that you are familiar with online. This article......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site