New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 987
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image wireless: Security HeadLines: Bad day for WLAN security image
Wireless
Bad day for WLAN security
Two weaknesses in one day
By Peter Judge,
Techworld

Just when we all thought wireless security was getting more stable, up pop two old weaknesses in wireless security which could make WPA worse than WEP.

With WPA on the way, as an interim to the IEEE's all-singing, all-dancing security update, 802.11i, the Wi-Fi industry is ready to settle back and worry about other things than security. However, two experts independently chose this week to remind us that old weaknesses can make the continued gaps in Wi-Fi security more serious than they might otherwise be.


In a paper posted at the Wi-Fi Technology Forum, GianLuigi Me, a lecturer at the University tor Vergata of Rome, argues that the vulnerability of any wireless encryption can have far worse consequences than is usually thought, because of well-known weaknesses with the SNMP management protocol.


SNMP (simple network management protocol) is used to monitor and control the performance of network equipment. Designed for a wired network, it was not created with eavesdropping in mind. Many access points can be managed by SNMP over the wireless link, which would allow the hacker to reconfigure the access points.


The most widely implemented version of SNMP protects the network with a password the CommunityName, which the network management station must give to the network device in order to perform any management task. Most management products, out of the box use a default name, public, but even if this is changed, the password is at risk, because SNMP sends it in cleartext. If the wireless network uses WEP encryption, a malicious hacker only has to break that to get the SNMP password and have administrator privileges, allowing him to change any settings on the Wi-Fi access point.


Meanwhile, for those who have moved on to WPA, the Wi-Fi community's interim security standard, comes a salutory reminder that WPA security only as good as the passphrase chosen by the user to set up the keys used.


The warning comes from Robert Moskowitz, senior technical director pf ICSA Labs, who points out that WPA allows users to have a pre-shared key from which encryption keys are generated. This can be a random number or a passphrase, but many users will pick a passphrase consisting of English words. If they do, then the hacker only needs to detect the initial handshake, and carry out a dictionary attack, to have access to all subsequent data, despite the fact that the keys continually change, since all these keys can be worked out from other information the hacker can know. The whole keying hierarchy falls into the hands of anyone possessing the PSK, as all the other information is knowable, says Moskowitz.


According to Moskowitz, this weakness makes WPA, in some cases, worse than WEP, the insecure standard it replaces: The risk of using PSKs against internal attacks is almost as bad as WEP, he says. The risk of using passphrase based PSKs against external attacks is greater than using WEP.







techworld.com
Posted on Monday, 10 November 2003 @ 04:50:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· More about Wireless
· News by phoenix22


Most read story about Wireless:
First Ever GSM Cellphone Exploit

image
Article Rating
Average Score: 4
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register