{"id":13973,"date":"2014-08-31T21:36:49","date_gmt":"2014-09-01T02:36:49","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=13973"},"modified":"2014-08-31T21:36:49","modified_gmt":"2014-09-01T02:36:49","slug":"offline-attack-shows-wi-fi-routers-still-vulnerable","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=13973","title":{"rendered":"Offline attack shows Wi-Fi routers still vulnerable"},"content":{"rendered":"<blockquote><p>The research, originally demonstrated at the PasswordsCon Las Vegas 2014 conference\u00a0in early August, builds on\u00a0<a href=\"http:\/\/sviehb.wordpress.com\/2011\/12\/27\/wi-fi-protected-setup-pin-brute-force-vulnerability\/\">previous work published by Stefan Viehb\u00f6ck<\/a>\u00a0in late 2011. Viehb\u00f6ck found a number of design flaws in Wi-Fi Protected Setup, but most significantly, he found that the PIN needed to complete the setup of a wireless router could be broken into smaller parts and each part attacked separately. By breaking down the key, the number of attempts an attacker would have to try before finding the key shrunk from an untenable 100 million down to a paltry 11,000\u2014a significant flaw for any access-control technology.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/arstechnica.com\/security\/2014\/08\/offline-attack-shows-wi-fi-routers-still-vulnerable\/\">Offline attack shows Wi-Fi routers still vulnerable | Ars Technica<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The research, originally demonstrated at the PasswordsCon Las Vegas 2014 conference\u00a0in early August, builds on\u00a0previous work published by Stefan Viehb\u00f6ck\u00a0in late 2011. Viehb\u00f6ck found a number of design flaws in Wi-Fi Protected Setup, but most significantly, he found that the &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=13973\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[465,427,78,363],"class_list":["post-13973","post","type-post","status-publish","format-standard","hentry","category-networking","tag-access-point","tag-exploit","tag-wifi","tag-wps"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13973"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13973\/revisions"}],"predecessor-version":[{"id":13974,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/13973\/revisions\/13974"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13973"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}