• Hey, guest user. Hope you're enjoying NeoGAF! Have you considered registering for an account? Come join us and add your take to the daily discourse.

All your WiFi devices are broken, Android/Linux devices particularly devastated

Entroyp

Member
People need not to stress too much from this, your most sensitive PII is already out there thanks to equifax.

On a serious note, make sure you update all your devices and not think much about this for now.
 

ty_hot

Member
Just to check if I understood:

with this breach someone can come and, with the right equipment and after finding a device that is not patched (easy), pretends that he is the router, so that he can read all infor that goes through tihs network (including the 'safe' devices, patched)?

And where does the router comes in the equation? Few pages back there was people saying that there are already update files for some routers (dd wrt). How does it change anything? In the other thread it was speculated that if your device or your router is patched you are safe. Is it?

I just updated my router to dd wrt (I was already going to do it, just stopped in the middle of the process a few months ago lol anyway, I dont think its a patched fw because its from 10/10).
 
the one fucking person on my network using an android device is my step dad........damn it

Can patching the router alone and at least leave all other devices and updated units safe if someone else connects with an un-updated device?

1> Your step dad's android being compromised (which isn't going to happen) wouldn't break it for you.

2> Patching your router isn't the fix, patching your device is. The exploit happens when your device tries to reassociate with an AP either due to roaming, time out, association drop, etc.
 
Just to check if I understood:

with this breach someone can come and, with the right equipment and after finding a device that is not patched (easy), pretends that he is the router, so that he can read all infor that goes through tihs network (including the 'safe' devices, patched)?

Can only read your transmissions. Has to basically be in the room with you. Has to wait for your device to reassociate with an AP.
 

ViciousDS

Banned
1> Your step dad's android being compromised (which isn't going to happen) wouldn't break it for you.

2> Patching your router isn't the fix, patching your device is. The exploit happens when your device tries to reassociate with an AP either due to roaming, time out, association drop, etc.

awesome.....time to patch a bunch of stuff in the next week.....this doesn't seem too bad, but I avoid public Wi-Fi's like the plague even when they have it anyways


So basically someone has to be literally right there when I'm establishing connection to the router......with my routers info.....yes, its definitely a problem but I can't see home networks unless you are in a massively rich area being effected and public wifis would be insanely easy to target
 

Noema

Member
the one fucking person on my network using an android device is my step dad........damn it

Can patching the router alone and at least leave all other devices and updated units safe if someone else connects with an un-updated device?

Don't worry too much about it unless you live in a crowded condo filled with wanna be hackers. And your network is unlikely to be compromised by one vulnerable device. Feasible but super unlikely.
 
awesome.....time to patch a bunch of stuff in the next week.....this doesn't seem too bad, but I avoid public Wi-Fi's like the plague even when they have it anyways


So basically someone has to be literally right there when I'm establishing connection to the router......with my routers info.....yes, its definitely a problem but I can't see home networks unless you are in a massively rich area being effected and public wifis would be insanely easy to target

Some stuff was secretly patched over the past month, some stuff patches dropped today.




Android is a particular worry because if someone is *really* smart they could hack the actual wifi network, send deauths, force the exploit, and then sent apt-get or apt-put to android phones to install software.
 

RoadHazard

Gold Member
awesome.....time to patch a bunch of stuff in the next week.....this doesn't seem too bad, but I avoid public Wi-Fi's like the plague even when they have it anyways


So basically someone has to be literally right there when I'm establishing connection to the router......with my routers info.....yes, its definitely a problem but I can't see home networks unless you are in a massively rich area being effected and public wifis would be insanely easy to target

How do you figure that? I can see like 15 Wi-Fi networks on my phone from my living room.
 
Isn't it relatively easy to brute force someone's wifi password? Assuming it is, once you are on the network you can set up packet sniffer and catch everything. How is this worse than that scenario?
 

GodofWine

Member
So a black van with some Wifi antennas on the roof outside my house is an issue...

This sounds like a nightmare for hospitals and major industries, and not so much for a typical person.
 
Isn't it relatively easy to brute force someone's wifi password? Assuming it is, once you are on the network you can set up packet sniffer and catch everything. How is this worse than that scenario?

It's easy in that you basically setup the software to do it.

But that requires deauth, capturing the handshake, and then running decrypt on the key, which can take *years*.
 

ViciousDS

Banned
How do you figure that? I can see like 15 Wi-Fi networks on my phone from my living room.

I can limit the power output on my router to only work within my house if need be


It's easy in that you basically setup the software to do it.

But that requires deauth, capturing the handshake, and then running decrypt on the key, which can take *years*.


Yes, this sounds like its more of a nightmare for hospitals, banks and major corps which will obviously be the bigger targets....if not THE targets they want data from
 

RoadHazard

Gold Member
Isn't it relatively easy to brute force someone's wifi password? Assuming it is, once you are on the network you can set up packet sniffer and catch everything. How is this worse than that scenario?

If it's a very weak password, I guess? Not if it's strong. Would take a very long time, and wouldn't be worth the effort I'd think.
 
So a black van with some Wifi antennas on the roof outside my house is an issue...

This sounds like a nightmare for hospitals and major industries, and not so much for a typical person.

1> Not really, because if you're associated with your AP and it doesn't completely dump your client when your device goes to sleep, you won't reassociate for the black van to potentially see the exploit.


2> Most important info like CC, health records, etc are often transmitted on hardwire systems anyway.
 

Sesha

Member
Oh wow. Crazy.

Shame my Windows laptop screen is broken and needs fixing, I don't have the money to have it fixed rn, and the only other convenient access I have is Mac devices.
 

ViciousDS

Banned
You tha real MVP.


However, in MDU and suburbs over the next 5 years or so? Yeah, my job is working to fix the "help I'm surrounded by 73 SSIDs" problem.

ooooooo,

sound like fun lol


I already can see 15 networks.....only 3 are actual routers though lol


for those who want a short term solution that i think might work


Opera has a VPN built right into their browser for easy use.....maybe use that for the time being if you wish to browse and don't want to pay
 
So my old Dell tablet stuck on Android 5.0 is out of luck with an update? Dell already officially announced that they dropped support for it a while back.
 
this-is-fine.0.jpg
.
 

LoveCake

Member
I just had an update on my Linux Mint.

WPA and WPA2 are methods for securing wireless networks, the former using IEEE 802.1X, and the latter using IEEE 802.11i. This software provides key negotiation with the WPA Authenticator, and controls association with IEEE 802.11i networks.

This site seems to explain it pretty well for the non-technically minded people.
KRACK Wi-Fi attack threatens all networks: How to stay safe and what you need to know
https://www.pcworld.com/article/3233308/security/krack-wi-fi-security-flaw-faq-tips.html?
 

RoadHazard

Gold Member
ooooooo,

sound like fun lol


I already can see 15 networks.....only 3 are actual routers though lol


for those who want a short term solution that i think might work


Opera has a VPN built right into their browser for easy use.....maybe use that for the time being if you wish to browse and don't want to pay

Opera is also owned by a Chinese company since some time back, so... I dunno?
 

Koren

Member
Problem is bad, but OP is going a little too far. Attacker still cannot see https encrypted data (which honestly in this day and age covers pretty much everything important
Well, I discover this summer that you can't even create a website that ask login/password on non https that won't make Firefox go mad.

It was a hassle (I just wanted some documents not totally public) to get a cert just because of this (Firefox also refuse self-signed certs and some referees) but I guess that means there's not much non-https indeed.

But if they can inject packets, couldn't there be some elaborate DNS spoofing and man in the middle attacks?
 

shockdude

Member
Everyone's been saying that a bad guy can basically impersonate a router in the worst case.
Can a bad guy impersonate a client and access a router, and thus access the whole network? I don't think that's possible but I'd like to confirm anyway.

edit: only if you're using AES-GCMP, a Wireless-AC/WiGig feature that is probably not yet enabled in modern networking hardware. Probably.
 

Blizzard

Banned
I've read over this about 3 times and I'm still not sure I understand the limitations here.

1. Is this attack ONLY possible by faking router radio packets during the handshake?

2. Once the attack has been executed, since the wireless network key appears not to be revealed and they can't join the network, the hacker can still sniff the packets and possibly decrypt them if they guess some known content, even without THEMSELVES being allowed onto the network?


If both of the above are true that's bad but it seems to be that anyone should treat non HTTPS connections as insecure anyway. The possibility of this attack allowing a man in the middle attack on an HTTPS connection is more concerning to me.
 
awesome.....time to patch a bunch of stuff in the next week.....this doesn't seem too bad, but I avoid public Wi-Fi's like the plague even when they have it anyways


So basically someone has to be literally right there when I'm establishing connection to the router......with my routers info.....yes, its definitely a problem but I can't see home networks unless you are in a massively rich area being effected and public wifis would be insanely easy to target

So Furthermore if you don’t broadcast your network ID then you would be even harder to breach?
 

Brandon F

Well congratulations! You got yourself caught!
2017 stays winning.

So shit what do I do now? I have exactly 137 devices that connect to WiFi seemingly...
 

mrkgoo

Member
I wonder if older devices will be patched, or if they will patch older operating systems without requiring updating. Speaking about Apple here, specifically, but it applies to everything.
 
Top Bottom