| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 84046 | 2007-10-22 08:54:00 | WEP security cracked? | lakewoodlady (103) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 604345 | 2007-10-23 21:45:00 | Here you go (details of the vulnerability in WPA-PSK): www.informit.com www.informit.com Unfortunately I don't have a comparison between WPA-PSK and WPA2-PSK from the security perspective - I only know that WPA2-PSK isn't vulnerable to the same exploit as WPA-PSK. [Edit: Having read those articles, it doesn't look as though that's what I was actually trying to find, as it involves dictionary or bruteforce crasking the PSK. Looks like I'm gonna have to search a little harder :rolleyes:.] |
Erayd (23) | ||
| 604346 | 2007-10-23 23:14:00 | Edit two: Appears I was only partially right, the protocol is vulnerable but still requires that the password be cracked - however this can be done offline (and potentially with a large cluster) rather than needing to be onsite like WEP. | Erayd (23) | ||
| 604347 | 2007-10-24 08:24:00 | Edit two: Appears I was only partially right, the protocol is vulnerable but still requires that the password be cracked - however this can be done offline (and potentially with a large cluster) rather than needing to be onsite like WEP. So unless you have sensitive information on your computer & someone with deep pockets willing to break the law to get at it, you have nothing to worry about (as long as you have a good password). It would take far more time than almost anybody would devote to the task to brute force a decent passphrase. Any home user with a cluster is probably just someone playing round with clustering on cheap/old hardware. |
Greven (91) | ||
| 1 2 3 | |||||