-
Notifications
You must be signed in to change notification settings - Fork 183
03. WPS (WiFi Protected Setup)
Koutto edited this page Nov 1, 2020
·
1 revision
- WPS only works with WPA/WPA2-Personal.
- WPS currently supports two methods:
- Personal Information Number (PIN)
- Push Button Configuration (PBC)
- 8-digit PIN.
- 1 digit of the PIN is a checksum.
- First group of 4 digits is checked independently => max 10000 tries for breaking the first group, then max 1000 tries for the second group (only 3 digits because of the checksum digit).
- Average of about 5500 attempts needed for bruteforce.
- Many routers now implement timeout, e.g. 60s locked out after 3 consecutive bad attempts.
-
WPS PIN smart bruteforce using:
- Known PINs for certains APs from given manufacturers
- Known PIN generation algorithms
-
WPS Bruteforce (online): Usually not very practicable due to timeouts...
-
WPS Pixie Dust Attack (offline bruteforce):
- Some APs have weak ways of generating nonces (known as E-S1 and E-S2) that are supposed to be secret (insecure PRNG) => Attack is possible only if the AP uses a vulnerable chipset.
- List of vulnerable routers: https://docs.google.com/spreadsheets/d/1tSlbqVQ59kGn8hgmwcPTHUECQ3o9YhXR91A_p7Nnj5Y/edit#gid=2048815923
- Technical details: http://archive.hack.lu/2014/Hacklu2014_offline_bruteforce_attack_on_wps.pdf
-
WPS Null PIN attack: Some really bad implementations allowed the Null PIN to connect.
- 01. WiFi Basics
- 02. 802.11 Specifications
- 03. WPS (WiFi Protected Setup)
- 04. WPA Protocol Overview
- 05. WPA/WPA2 Personal (PSK) Authentication
- 06. WPA/WPA2 PSK Traffic Decryption
- 07. WPA/WPA2 Enterprise (MGT)
- 08. Evil Twin Attacks
- 09. 802.11 Network Selection Algorithms
- 01. WiFi Interfaces Management
- 02. WiFi Connection
- 03. WiFi Monitoring (Passive Scanning)
- 04. Hotspot Captive Portal Bypass
- 05. WiFi Denial of Service
- 06. WEP Authentication Cracking
- 07. WPA/WPA2 Personal (PSK) Authentication Cracking
- 08. WPA/WPA2 Enterprise (MGT) Authentication Cracking
- 09. WPA/WPA2 Personal (PSK) Traffic Decryption
- 10. Basic AP (Manual Configuration)
- 11. Open Network (no passphrase) Rogue AP / Evil Twin
- 12. WPA/WPA2 Personal (PSK) Rogue AP / Evil Twin
- 13. WPA/WPA2 Enterprise (MGT) Rogue AP / Evil Twin