Overclock.net banner

Can WPA2 be cracked? yes? no? and why?

7661 Views 14 Replies 14 Participants Last post by  gonX
I've been hearing stories about WPA2 and it's incredible level of safety for wireless networks but... is it really that safe?

Just to add, my network password has 15 characters, among them, numbers and other symbols, and yes, I use WPA2.
1 - 15 of 15 Posts
ANYTHING. Can be cracked.

It's more a matter of how long it would take.

Basically there are some morally gray programs out there that sniff packets and slowly decrypt the password. There is no set time-frame, it all depends, some luck, some depends on how much data you transfer, etc.

WPA2 > WPA > WEP. WEP can be cracked in 30 seconds using certain programs, WPA a few hours.
With a strong enough password, you'll be fine. It's pretty hard to brute-force a WPA2 with a strong password.
anything can be cracked. government files have been
Rainbow tables spring to mind. Probably something more effective though.

My mate and I cracked WEP in about 5 minutes, it's so unsafe. Neither of us really know anything about Linux either
See less See more
Backtrack can be useful for testing the security of your wireless network

http://www.remote-exploit.org/backtrack.html

Obviously you wouldn't be using it for any Illegal/Immoral uses.

Doesn't work with all WLAN devices though. You'd need to investigate a bit mroe yourself
See less See more
there are different ways to do it. and it will keep getting faster w/ new tech. there are already programs that will use nV GPUs to speed up the crack.

but if you want to be safe, you should set up a radius server. there used to be a great one you could put on a WRT54GL called TinyPEAP, but it stopped development & got taken down because of GPL problems. if you have an unused PC you could always run freeRADIUS on it though.

if you stick w/ WPA2 the best thing you can do is not broadcast your SSID, create the longest password your router allows, and keep it completely random gibberish. most routers also have mac filtering. so you can block out all computers that dont have matching mac addresses of your comptuers/devices.
5
Quote:

Originally Posted by Super304 View Post
Backtrack can be useful for testing the security of your wireless network

http://www.remote-exploit.org/backtrack.html

Obviously you wouldn't be using it for any Illegal/Immoral uses.

Doesn't work with all WLAN devices though. You'd need to investigate a bit mroe yourself

thats what i use
especialy bt4

its good to test your systems security, i cracked wep toooo easily, wpa takes abit longer and wpa2 just about the same depending on the password, best bet is to have a 64 character password, would take someone very long to crack that

theres nothing "secured" thats just a word to make people believe its safe, if someone is dedicated enough they will crack/hack anything

edit: for a second i thought u said it doesnt work with WLAN devices
yh it only will work with certain chipsets, backtrack 3 never worked on mine but backtrack 4 does
injection and everything Woot woot XD
See less See more
For most of my security testing, I have used Virtual Honeypots and Metasploit framework. I'll have to take a look at "Backtrack". First I have heard of it.
Turning off ssid broadcast doesn't really do much. The only thing "turning off the SSID" does is null the value of the network name field in the 802.11 beacon. Anytime a station associates or re-associates, that value is sent in the clear within the respective 802.11 frames. For this reason, it's not considered a security measure at all.
Quote:

Originally Posted by MrAMD_Fan View Post
Turning off ssid broadcast doesn't really do much. The only thing "turning off the SSID" does is null the value of the network name field in the 802.11 beacon. Anytime a station associates or re-associates, that value is sent in the clear within the respective 802.11 frames. For this reason, it's not considered a security measure at all.
it's about the same as tinting the glass on a car. its not going to stop a thief from stealing the car if he sees you get out of it and leave. but if he doesn't he wont know if youre in the car or not. it's better than not doing it, lets just agree on that.

also changing the SSID to something completely random helps in WPA2 too since it's used to salt the hashes & known/common SSIDs are used in some attacks.
See less See more
As mentioned above anythingg can and will be cracked. It all depends on time.

Rainbow tables do help the proccessing time required for cracking WPA2. However, right now it is still by far the most secure and safe means of Wireless Security. As long as you use AES. TKIP has alread seen an exploit using packet injection.
3
Quote:

Originally Posted by alex98uk View Post
Rainbow tables spring to mind. Probably something more effective though.

My mate and I cracked WEP in about 5 minutes, it's so unsafe. Neither of us really know anything about Linux either

Who says you need linux to crap wep
See less See more
You Should also think about If there Is many OPEN wifi routers around you and if there is I doubt people would bother hacking you.
I would say as long as you have any sort of AES encryption you should be good to go. TKIP has been demonstrated to be insecure - same goes for WAP. 15 letters with random upper cases and whatnot with an uncommon router name (hell, even ThisIsMyRouter should be okay) should be enough to deter crackers away.

You should only be worried if you have some seriously important/confidential files on your network, or if you know somebody is trying to gain access to your computers.
1 - 15 of 15 Posts
This is an older thread, you may not receive a response, and could be reviving an old thread. Please consider creating a new thread.
Top