LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-25-2010, 08:12 AM   #1
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Arrow AirTight Security Researcher Uncovers Wi-Fi Vulnerability in WPA2


Quote:
AirTight Networks, the leading provider of wireless intrusion prevention systems and services (WIPS) announced today that senior wireless security researcher, Md Sohail Ahmad has uncovered just how easy it is to hack into an encrypted wireless network without breaking the encryption key. A documented, yet little known, vulnerability of the Wi-Fi WPA2 security protocol, which AirTight has named 'Hole 196,' exposes secured wireless networks to a key "loophole" that allows authorized users to bypass private key encryption and authentication. AirTight researcher, Md. Sohail Ahmad, will be demonstrating this vulnerability at the Black Hat Arsenal and at DEFCON18 in a presentation entitled "WPA Too?!" in Las Vegas on July 29th and July 31st respectively.
Complete Article

Thanks to Slashdot for covering this.
 
Old 07-25-2010, 11:40 AM   #2
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
I'm a bit confused by this since they never really define "authorized user". It seems to me that you have to be connected to the network before you can use the exploit, in which case it seems the exploit is pretty useless since you're already connected to the network.

Am I missing something?
 
Old 07-25-2010, 01:00 PM   #3
PTrenholme
Senior Member
 
Registered: Dec 2004
Location: Olympia, WA, USA
Distribution: Fedora, (K)Ubuntu
Posts: 4,187

Rep: Reputation: 354Reputation: 354Reputation: 354Reputation: 354
Quote:
Originally Posted by Hangdog42 View Post
I'm a bit confused by this since they never really define "authorized user". It seems to me that you have to be connected to the network before you can use the exploit, in which case it seems the exploit is pretty useless since you're already connected to the network.

Am I missing something?
Perhaps. What the article suggests is that someone already connected to the network could easily decode packets encrypted for use by other users of that network. The article also asserts that interception by network uses of traffic not intended for their use is a major security problem.
 
1 members found this post helpful.
Old 07-26-2010, 05:20 AM   #4
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
I agree with ptrenholme and interpret the article the same way. It keeps referencing 'insider' exploits and says that this hole is different than an external access exploit. Take this line from the article: "AirTight felt it was important to raise awareness around it ... as any security best practice you need a layered approach because one size does not fit all."

Sounds like a marketing ploy based on FUD (Fear Uncertainty and Doubt) to sell their services.
 
Old 07-26-2010, 07:06 AM   #5
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
Thanks, that explanation sounds reasonable. So essentially this exploit puts WPA2 encrypted traffic on the same level as wired traffic in that any packet could be examined by someone other than the intended recipient.
 
Old 08-03-2010, 01:52 AM   #6
kiranGosavi
LQ Newbie
 
Registered: Aug 2010
Posts: 1

Rep: Reputation: 0
Webinar on Hole196 vulnerability

You can get your queries solved by attending the webinar AirTight is hosting. This webinar is completely based on this vulnerability.

Last edited by kiranGosavi; 08-03-2010 at 02:04 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Security Researcher to release Cisco rootkit at EUSecWest LXer Syndicated Linux News 0 05-16-2008 11:50 AM
Advice, please - Linux dist for WPA2 security JonnyL Linux - Newbie 1 01-20-2008 11:44 AM
LXer: Researcher Uncovers McAfee Linux VirusScan Flaw LXer Syndicated Linux News 0 12-16-2006 05:33 AM
security vulnerability Malachai.77 Linux - Security 2 06-10-2006 12:12 AM
mailman security vulnerability? aquaboot Ubuntu 0 01-16-2006 07:40 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:54 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration