WPA Cracked in 15 minutes

Photo of author

Tim Higgins

The shorter time is attributed to tricking a WPA-secured AP into sending large amounts of data and a "mathematical breakthrough" that speeds the TKIP crack.

The crack enables one-way communication from AP to client, but not vice-versa since the attack does not break the encryption keys used by the client.

The article says that some of the code used in the new attack was "quietly added to Beck’s Aircrack-ng Wi-Fi encryption hacking tool two weeks ago".

Related posts

Linksys Adds Small-Biz N Acess Points

Linksys has introduced N300 and N600 business-class access points.

D-Link Ends 802.11b Feedback Experiments

D-Link today informed SmallNetBuilder that it has ended D-Link's "feedback" gathering exercise on 802.11b for its DIR-655 and DIR-825 draft 802.11n routers.

TP-LINK Announces Wi-Fi Extender Pair

TP-LINK has introduced AC1900 and AC1750 class extenders.