TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

WPA2 vulnerability found

18 点作者 all将近 15 年前

3 条评论

ax0n将近 15 年前
Expert analysis here: <a href="http://news.ycombinator.com/item?id=1541729" rel="nofollow">http://news.ycombinator.com/item?id=1541729</a><p>Jennifer's a friend of mine who knows her stuff when it comes to 802.1X, NAC and WiFi. It looks like it's only related to broadcast traffic, and you have to be authenticated. Also, I can't tell, but it sounds like it might be restricted to radius-authenticated networks (WPA / WPA2 Enterprise, not PSK like you'd find in a coffee shop)
teilo将近 15 年前
Wow. If this is legit, this one is really bad. It covers this case:<p>1) Bob and Alice go to a coffee shop that uses WPA2, but gives the password to paying customers.<p>2) Alice uses the exploit to acquire Bob's PSK.<p>3) Alice records and decrypts all of Bob's traffic.
评论 #1545624 未加载
Groxx将近 15 年前
Basic concept:<p>Unicast traffic has safeguards against spoofing. Multicast does not. Spoof yourself as the AP, send out multicast traffic, and clients respond with unicast traffic <i>with their key</i>.<p>OK... seriously? <i>Session keys!</i> If you never send them out after negotiating them, the attacker would never get the key, and all your past traffic would still be secure.<p>The state of "security" with wireless communications continually strikes me as an ass-backwards place... wtf keeps going wrong? A couple standard, basic security techniques would seem to resolve nearly every cracking problem, and a large number of MITM ones too (certificates!).