Not so long ago, between two cases, the researchers managed to crack a part of Wi-Fi Protected Access (WPA) - for those who do not know - this is an encryption protocol for wireless networks.
In about 15 minutes, Eric Tewes and Martin Beck uncovered the Temporal Key Integrity Protocol and demonstrated visually intercepting the information transmitted in both directions and its open reading. Plus, it is also possible to modify the headers and forge the packages received by the user.
In fact, the technology is a channel overload with large amounts of information, which allows you to apply the formula developed by a couple of programmers to crack the security key.
Wired Equivalent Privacy (WEP) - part of WPA, the security algorithm in IEEE 802.11 networks, has long been considered obsolete, since it was developed in the mid-90s. In fact, when using special software, which is easy to find on the Internet for free access, this algorithm breaks down at times.
In turn, WPA2, an improved version of the protocol, is still considered resistant to all known methods of attack, but its support, in fact, appeared only in March of this year, so most of the routers currently in use do not support it.
Hacking WPA and moving to newer technologies were most actively discussed at the
PacSec Applied Security Conference recently held in Tokyo.
published at the request of Enchantner