NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Wireless Cracking - Reverse algo attack cracks Belkin router WPS PINs


1 Results - Page 1 of 1 -
1
Author Message
Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Mon, 13 Apr 2015 @ 12:48:19

said:


A researcher who last year turned up weak WPS PIN protection in D-Link broadband modems has found the same problem exists on Belkin devices.
The writer at embedded systems hacker hangout /dev/ttyS0, who goes by the name of Craig, says the upshot of his latest work is the same as previously: it demonstrates that like D-Link, Belkin uses a vulnerable procedure to generate its WPS PINs.




The problem is that the vulnerable devices (list at end of article) all use easily-discoverable information to seed the PIN-generating algorithm, and a skilled attacker – or one using /dev/ttyS0's proof-of-concept code – can reproduce how the security number is generated.
The algorithm takes the device MAC address and serial number as its inputs. MAC addresses are easy for an attacker to gather, and Belkin provides the serial number in response to an ordinary 802.11 probe request.
The /dev/ttyS0 post claims that 80 per cent of the 24 devices tested exhibited the vulnerability.

LINK


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E


1 Results - Page 1 of 1 -
1

We have a total of 210761 messages in 25878 topics.
We have a total of 22930 registered users.
Our newest registered member is xowexo.