Skip to main content

Wireless networks lure hackers

posted onJuly 16, 2001
by hitbsecnews

LAS VEGAS--A new way to attack wireless networks underscores the lack of security for PC owners using the airwaves to connect their computers, said security experts speaking at the Black Hat Briefings conference. On Thursday, Tim Newsham, a researcher for security firm @Stake, presented the details of weaknesses in the password system of wireless networks that could lead to a break in security in less than 30 seconds. The flaw is the third to be uncovered in the so-called Wired Equivalent Privacy, or WEP, protocol that supposedly secures wireless networks.

"WEP is inherently insecure," said Newsham. "So using WEP is essentially just throwing another barrier--and a small one--in front of the attacker."

That barrier can be overcome in 5 to 30 seconds in certain cases, he said.

Specifically, wireless systems that rely on a 64-bit key--used in many homes and earlier hardware--can be broken in less than a minute, letting the attacker see the data beamed across the networks.

Newer 128-bit wireless LAN (local area network) cards are fairly strong. But poorly chosen passwords can still be cracked with an old technique known as a dictionary attack: Using a list of common passwords and a dictionary of words, the potential intruder can try various combinations until the password is broken.

"Either it works or it doesn't," Newsham said. "If it doesn't, you can try one of the other attacks."

Earlier at the Black Hat conference, Ian Goldberg, chief scientist for private network seller Zero Knowledge Systems, presented details on a variety of techniques for cracking the encryption of wireless networks.

"The point of a cryptographics protocol is to be able to communicate securely over an insecure medium," he said.

Using Goldberg's techniques, which he developed while earning a doctorate at the University of California at Berkeley, data on wireless networks can be modified, added or, in some cases, decrypted.

In the end, people need to understand that wireless networks are completely insecure. For the security conscious, "virtual private network" technology such as Secure Shell, known as SSH, or other encryption techniques should be used, he said.

"People need to treat wireless networks just as they do the Internet," Goldberg said. "That means using encryption technology to secure their data."

ZDNet Asia

Source

Tags

Networking

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th