
Security problems in 802.11-based networks. Security flaws in 802.11 data link protocols.
Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker. In 7th International Conference on Mobile Computing and Networking (MOBICOM 2001), pages 180-189. Intercepting mobile communications: the insecurity of 802.11. Nikita Borisov, Ian Goldberg, and David Wagner. In 9th Network and Distributed System Security Symposium (NDSS 2002). Using the Fluhrer, Mantin, and Shamir attack to break WEP. Adam Stubblefield, John Ioannidis, and Aviel D. In 8th International Workshop on Selected Areas in Cryptography (SAC 2001), volume 2259 of Lecture Notes in Computer Science, pages 1-24. Weaknesses in the key scheduling algorithm of RC4. Scott Fluhrer, Itsik Mantin, and Adi Shamir. responsible-disclosure-guideline.html, 2013. Policy for arriving at a practice for responsible disclosure. National Cyber Security Centre (NCSC). Technical Report CSC-STD-002-85, Department of Defense Computer Security Center (DoDCSC), Fort George G. However, since these routers are also used by many other companies in various countries, our findings seem to relate an international industry wide security issue. Together with the Dutch National Cyber Security Centre we have initiated a responsible disclosure procedure. A stolen password allows an adversary to abuse someone else's internet connection, for instance compromising the firewall, making a fraudulent transaction or performing other criminal activities.
Users that did not explicitly change their wireless password are most likely vulnerable to practical attacks which can recover their password within minutes. Such a password is loaded during device initialization and hardware reset. The algorithms are used to generate the default WPA2 password.
Finally, we present a number of use cases where we identify extremely weak password generating algorithms in various routers which are massively deployed in The Netherlands. Furthermore, we describe a procedure that can instantly gather a complete wireless authentication trace which enables an offline password recovery attack. In this paper, we compose a strategy on how to reverse-engineer embedded routers.
However, the passwords should have sufficient entropy to avert bruteforce attacks. This is a security protocol which is believed not to be susceptible to practical key recovery attacks. Nowadays, almost all routers use a secure channel by default that is based on Wi-Fi Protected Access II (WPA2). A router can offer a secure channel by cryptographic means which provides authenticity and confidentiality. A wireless router is a networking device that enables a user to set up a wireless connection to the Internet.