AirTight Security Researcher Uncovers Wi-Fi Vulnerability in WPA2
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
AirTight Security Researcher Uncovers Wi-Fi Vulnerability in WPA2
Quote:
AirTight Networks, the leading provider of wireless intrusion prevention systems and services (WIPS) announced today that senior wireless security researcher, Md Sohail Ahmad has uncovered just how easy it is to hack into an encrypted wireless network without breaking the encryption key. A documented, yet little known, vulnerability of the Wi-Fi WPA2 security protocol, which AirTight has named 'Hole 196,' exposes secured wireless networks to a key "loophole" that allows authorized users to bypass private key encryption and authentication. AirTight researcher, Md. Sohail Ahmad, will be demonstrating this vulnerability at the Black Hat Arsenal and at DEFCON18 in a presentation entitled "WPA Too?!" in Las Vegas on July 29th and July 31st respectively.
I'm a bit confused by this since they never really define "authorized user". It seems to me that you have to be connected to the network before you can use the exploit, in which case it seems the exploit is pretty useless since you're already connected to the network.
I'm a bit confused by this since they never really define "authorized user". It seems to me that you have to be connected to the network before you can use the exploit, in which case it seems the exploit is pretty useless since you're already connected to the network.
Am I missing something?
Perhaps. What the article suggests is that someone already connected to the network could easily decode packets encrypted for use by other users of that network. The article also asserts that interception by network uses of traffic not intended for their use is a major security problem.
I agree with ptrenholme and interpret the article the same way. It keeps referencing 'insider' exploits and says that this hole is different than an external access exploit. Take this line from the article: "AirTight felt it was important to raise awareness around it ... as any security best practice you need a layered approach because one size does not fit all."
Sounds like a marketing ploy based on FUD (Fear Uncertainty and Doubt) to sell their services.
Thanks, that explanation sounds reasonable. So essentially this exploit puts WPA2 encrypted traffic on the same level as wired traffic in that any packet could be examined by someone other than the intended recipient.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.