Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I'm pretty sure that OP is asking about the button on routers that allows you to press it to auto-connect devices to it without actually putting in the password.
As far as using it, no clue, I've never trusted that feature and disable it on my routers.
it's at my syster's house
my brother inlaw will not alow me to even look at the router's
configuration
what I need to know is how to catch the info when the
WPS button is pushed
tired to set the password in wicd BUT none of the password encryption configurations worked
I thought WPS had a horrible security vulnerability that allowed anybody to connect to the network, bypassing your security key - something about the WPS authentication key being a constant string (or an easily calculable one) across an entire manufacturer's line of devices. Every single security article I've ever read on WPS says that it should immediately be disabled.
I thought WPS had a horrible security vulnerability that allowed anybody to connect to the network, bypassing your security key - something about the WPS authentication key being a constant string (or an easily calculable one) across an entire manufacturer's line of devices. Every single security article I've ever read on WPS says that it should immediately be disabled.
yes it is brute force attack only has to try 11,000 passwords
IF I was willing to leave my computer there for 12 hours
I could get a working password from reaver and own the router
some one set it up and changed the master password
I thought WPS had a horrible security vulnerability that allowed anybody to connect to the network, bypassing your security key - something about the WPS authentication key being a constant string (or an easily calculable one) across an entire manufacturer's line of devices. Every single security article I've ever read on WPS says that it should immediately be disabled.
yes it is brute force attack only has to try 11,000 passwords
IF I was willing to leave my computer there for 12 hours
I could get a working password from reaver and own the router
some one set it up and changed the master password
It's much worse than that.
Certain manufacturers (eg: d-link and belkin) derive the WPS key directly from the router's MAC address which is sent unencrypted in every packet. All an attacker has to do is sniff a single packet and they're in. In the case of belkin they also use part of the serial number, but the router will happily tell anybody (not just devices that have already connected) it's serial number unencrypted, so it's not any better.
Last edited by suicidaleggroll; 04-12-2016 at 07:28 PM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.