I was reading some posts on the Full-disclosure mailing list and came across the some posts relating to WPA hacking (WPA attack improved to 1min). After spending hundreds of hours using the AIR tools to crack WEP encryption and looking into networks as part of my previous job, I was very interested to see how things are progressing.
The thread mentioned the paper “A Practical Message Falsification Attack on WPA” posted on http://bit.ly/8qwQt.
It was a coincidence as I was only taking to one of the executives at work about how easy WEP is to crack and what you can do/discover once you are in.
I hope you enjoy the paper.
—– Update —–
Once this was posted I received many message s and a few more links for the post.
So here thet are:
http://www.youtube.com/watch?v=ZeCVkWMUSzE
http://www.crn.com.au/News/154177,researchers-crack-wpa-encryption-in-60-seconds.aspx
http://www.renderlab.net/projects/WPA-tables/
http://205.127.87.136:6969/torrents /wpa_psk-h1kari_renderman.torrent?95896A255A82D1FE8B6A2BFFC098B735058B30D7
http://www.churchofwifi.org/Project_Display.asp?PID=90
http://jwis2009.nsysu.edu.tw/location/paper/A%20Practical%20Message%20Falsification%20Attack%20on%20WPA.pdf – Though will only help with TKIP
Thanks to
Oliver from ethicalhack.org
Michael from SA Government
Tim from CQR Consulting
—– End Update ——