lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 26 Aug 2009 07:53:43 +0400
From: Найденко Александр
	<aanaydenko@...il.com>
To: Dragos Ruiu <dr@....net>, 
	Full-Disclosure mailing list <full-disclosure@...ts.grok.org.uk>
Subject: НА:  WPA attack improved to 1min, MITM



----- Исходное сообщение -----
От: Dragos Ruiu <dr@....net>
Отправлено: 26 августа 2009 г. 6:13
Кому: Full-Disclosure mailing list <full-disclosure@...ts.grok.org.uk>
Тема: [Full-disclosure] WPA attack improved to 1min, MITM

The Beck/Tews WiFi WPA attack presented at PacSec has been improved  
(down to 1 min, MITM) by 2 .jp researchers (Ohigashi, Morii) http://bit.ly/clCpm 
  Remember: avoid WPA/TKIP and force AES only encryption in WPA2 -  
don't let your access point automatically fall back automatically to  
the insecure TKIP/WPA mode, to be safe. (At least until any WPA2  
attacks are published ;-P)

cheers,
--dr

P.S. CanSecWest registration is now up, and a new Japanese PacSec  
registration is live. June has been picked as the time for EUSecWest  
in Amsterdam.
(hat tip: T Harada)


[Включен не весь текст исходного сообщения]
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ