Pennock's Fiero Forum
  Totally O/T - Archive
  Router PIN to access WiFi is easily cracks and the PIN feature is On in most models!

T H I S   I S   A N   A R C H I V E D   T O P I C
  

Email This Page to Someone! | Printable Version


Router PIN to access WiFi is easily cracks and the PIN feature is On in most models! by theogre
Started on: 12-28-2011 08:44 PM
Replies: 24
Last post by: theogre on 01-13-2013 09:41 PM
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-28-2011 08:44 PM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
Router's feature using a PIN instead a long pass-phrase can be cracked 2 Hours.
All routers build in last 5-10 years has the feature and most are On by Default.

Wi-Fi 'protected set-up' not so protected after all from C-net News

Disable the PIN feature ASAP.
In Future, check after doing a Factory Reset and Disable it...

Using the PIN feature? Sorry... Get a long and strong pass-phrase.

The fix, if/when there is a fix, need a firmware update for the router and getting a new firmware could take weeks, months, or never. Some Third Party firmware may need to be updated too.

------------------
Dr. Ian Malcolm: Yeah, but your scientists were so preoccupied with whether or not they could, they didn't stop to think if they should.
(Jurassic Park)


The Ogre's Fiero Cave (It's also at the top and bottom of every forum page...)

[This message has been edited by theogre (edited 12-28-2011).]

IP: Logged
PFF
System Bot
spark1
Member
Posts: 11159
From: Benton County, OR
Registered: Dec 2002


Feedback score: (1)
Leave feedback





Total ratings: 175
Rate this member

Report this Post12-28-2011 09:10 PM Click Here to See the Profile for spark1Send a Private Message to spark1Direct Link to This Post
Luckily, all my stuff is too old to have the WPS feature. Some devices won't even do WPA2.
IP: Logged
Tony Kania
Member
Posts: 20794
From: The Inland Northwest
Registered: Dec 2008


Feedback score:    (7)
Leave feedback





Total ratings: 305
User Banned

Report this Post12-28-2011 09:39 PM Click Here to See the Profile for Tony KaniaSend a Private Message to Tony KaniaDirect Link to This Post
WiFi off. Hardlined. Biatch azzed neighbor cannot hack. Me safe.

Tony
IP: Logged
phonedawgz
Member
Posts: 17106
From: Green Bay, WI USA
Registered: Dec 2009


Feedback score:    (23)
Leave feedback





Total ratings: 291
Rate this member

Report this Post12-29-2011 12:04 AM Click Here to See the Profile for phonedawgzClick Here to visit phonedawgz's HomePageSend a Private Message to phonedawgzDirect Link to This Post
So how does one brute force break in on it?

I mean suppose I just wanted to "test" it out/
IP: Logged
Khw
Member
Posts: 11139
From: South Weber, UT. U.S.A.
Registered: Jun 2008


Feedback score: (1)
Leave feedback





Total ratings: 134
Rate this member

Report this Post12-29-2011 12:29 AM Click Here to See the Profile for KhwSend a Private Message to KhwDirect Link to This Post
 
quote
Originally posted by Tony Kania:

WiFi off. Hardlined. Biatch azzed neighbor cannot hack. Me safe.

Tony


I don't know about that... Well, okay you won't be hacked like that but... LOL, my freinds Mom kept having problems with her DSL. For some reason her modem would disconnect and when she'd try to reconnect it she'd have to call the phone company to get it to work again. Ends up when she was away during the day, her neighbor would hop the fence. He'd go to her phone box on the side of the house and connect a phone line to it, link his modem up and use the internet. Then he'd go out and unhook it before she got home. They only figured out what was happening because my freind was home one day when he hopped the fence to do it.
IP: Logged
Shill
Member
Posts: 2166
From: Spokane, WA
Registered: Apr 2009


Feedback score: N/A
Leave feedback

Rate this member

Report this Post12-29-2011 01:39 AM Click Here to See the Profile for ShillSend a Private Message to ShillDirect Link to This Post
DD-WRT FTW!!!
IP: Logged
Shill
Member
Posts: 2166
From: Spokane, WA
Registered: Apr 2009


Feedback score: N/A
Leave feedback

Rate this member

Report this Post12-29-2011 01:48 AM Click Here to See the Profile for ShillSend a Private Message to ShillDirect Link to This Post

Shill

2166 posts
Member since Apr 2009
 
quote
Originally posted by Khw:


I don't know about that... Well, okay you won't be hacked like that but... LOL, my freinds Mom kept having problems with her DSL. For some reason her modem would disconnect and when she'd try to reconnect it she'd have to call the phone company to get it to work again. Ends up when she was away during the day, her neighbor would hop the fence. He'd go to her phone box on the side of the house and connect a phone line to it, link his modem up and use the internet. Then he'd go out and unhook it before she got home. They only figured out what was happening because my freind was home one day when he hopped the fence to do it.


I remember when I was young back in the 56k days, instead of being grounded, my father had a quick disconnect in the line leading to the phone jack in my room. Little did he know, I went out to the store and bought 100ft of phone line and had it sneakily hidden under the trim pieces along the walls. He would disconnect me, I would raise hell and complain, then just plug in the 100ft cable I had hidden. I'm surprised he never caught on. and luckily he knew nothing about internet, occasionally he would pick up the phone and hear the modem buzzing, I told him it must not have disconnected on their end, just like how you could pick stay on the line for a long time and sometimes catch the other person picking the phone back up and dialing a different number. I taught him to cycle the phone on and off once or twice to get it to disconnect, which gave me time to run back into my room and disconnect the modem.
IP: Logged
Taijiguy
Member
Posts: 12198
From: Delaware, OH.
Registered: Jul 99


Feedback score:    (8)
Leave feedback





Total ratings: 244
Rate this member

Report this Post12-29-2011 05:57 AM Click Here to See the Profile for TaijiguySend a Private Message to TaijiguyDirect Link to This Post
 
quote
Originally posted by Shill:

DD-WRT FTW!!!


I must have four routers sitting around, and not a one of them is supported. I guess I'm eventually going to have to go out and actually get one that's specifically on their list of supported devices.

[This message has been edited by Taijiguy (edited 12-29-2011).]

IP: Logged
phonedawgz
Member
Posts: 17106
From: Green Bay, WI USA
Registered: Dec 2009


Feedback score:    (23)
Leave feedback





Total ratings: 291
Rate this member

Report this Post12-29-2011 08:51 AM Click Here to See the Profile for phonedawgzClick Here to visit phonedawgz's HomePageSend a Private Message to phonedawgzDirect Link to This Post
+1

 
quote
Originally posted by Shill:

DD-WRT FTW!!!


IP: Logged
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-29-2011 10:56 AM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
Pen Test? IE the Crack.
DD-WRT and other Third Party firmware? Maybe not.
For both... Read article and link in it. The crack will likely be a script kiddy tool soon.

The WPS feature problem is on by default in many models. Even you don't use WPS, default=on means problems and Every time you do a Factory Reset you need to turn off that feature.

DD-WRT etc likely has same problem w/ WPS if it can use the feature. DD-WRT has somethings on and off by default. I'm not using any Third Party Firmware w/ my current router and WPS was turn off because Any feature I don't use is turn off...

US-CERT recommends...
 
quote
Disable WPS.

Although the following will not mitigate this specific vulnerability, best practices also recommend only using WPA2 encryption with a strong password, disabling UPnP, and enabling MAC address filtering so only trusted computers and devices can connect to the wireless network.


Some say Access list is worthless because list only stops basic Script Kiddies and War Driving quick scan. I think stopping anyone is one less to worry about.

Disable UPnP should not be a issue... (UPnP has it own history of problems.)
Windows, all versions, UPnP is on but not a problem to Disable at router or Computer and most Firewall software blocks connecting to anything w/ UPnP anyway. Free tool at www.grc.com/unpnp/unpnp.htm

[This message has been edited by theogre (edited 12-29-2011).]

IP: Logged
Shill
Member
Posts: 2166
From: Spokane, WA
Registered: Apr 2009


Feedback score: N/A
Leave feedback

Rate this member

Report this Post12-29-2011 02:46 PM Click Here to See the Profile for ShillSend a Private Message to ShillDirect Link to This Post
I think i have gone a bit overkill with my security.

Ssid broadcast - off
Wpa 2 personal
Mac filter, allow only listed devices to connect.
Dhcp is in a very odd range and only enough slots for the amount of devices i own. And all ports are blocked to other ranges.
Router access is blocked to all wireless clients.

Its a PITA do get a new device connected, as no PCs are wired, only have 1 wire and it goes to the xbox.

[This message has been edited by Shill (edited 12-29-2011).]

IP: Logged
PFF
System Bot
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-29-2011 11:46 PM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
 
quote
Originally posted by Shill:

Ssid broadcast - off
Mac filter, allow only listed devices to connect.
Dhcp is in a very odd range...


WPA2 w/ strong pass-phrase is good. Weak password then well...

Disable SSID and using MAC/access list will only stopping basic Script Kiddies and War Driving w/ quick scan. Someone w/ time to kill will know both, like a neighbor, to monitor your network. It's easy to find networks w/o broadcast SSID, To start see this at TechRepublic. Kismet is just a download and is on NST

DCHP means if anything does connect they just get addy in range.... So why bother? Plus if they got that far... DCHP doesn't matter because hacker see the range that other units uses then just uses a static IP. Router will see any data from any device w/ valid IP and Mask, assign by DCHP or not.

[This message has been edited by theogre (edited 12-29-2011).]

IP: Logged
Shill
Member
Posts: 2166
From: Spokane, WA
Registered: Apr 2009


Feedback score: N/A
Leave feedback

Rate this member

Report this Post12-30-2011 02:53 AM Click Here to See the Profile for ShillSend a Private Message to ShillDirect Link to This Post
 
quote
Originally posted by theogre:


WPA2 w/ strong pass-phrase is good. Weak password then well...

Disable SSID and using MAC/access list will only stopping basic Script Kiddies and War Driving w/ quick scan. Someone w/ time to kill will know both, like a neighbor, to monitor your network. It's easy to find networks w/o broadcast SSID, To start see this at TechRepublic. Kismet is just a download and is on NST

DCHP means if anything does connect they just get addy in range.... So why bother? Plus if they got that far... DCHP doesn't matter because hacker see the range that other units uses then just uses a static IP. Router will see any data from any device w/ valid IP and Mask, assign by DCHP or not.



I don't claim to know everything, but i have a general understanding of how it works. And i set it up based on that small knowledge. So if i have 5 devices and my dhcp range is from xxx.xxx.xxx.183-188 and lease time is set to an obsurd amount of time such as 3 years, no other devices can use those ip's correct? And all other ips are blocked, if a hacker were to set a static ip of say xxx.xxx.xxx.50 it would disallow it, and he would not be able to connect via xxx.xxx.xxx.185 because it is already in use. And this is after he got past the hidden ssid and wpa2 and assigned a mac that was already connected. I personally wouldnt be able to do it, doesnt mean it cant be done.

IP: Logged
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-30-2011 09:33 PM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
Update...

 
quote
Stefan Viehbock discovered the vulnerability and reported it to the DHS. He claims that none of the major manufacturers stepped up to the plate with a patch. He is going to release a C-coded exploitation tool shortly -- perhaps that will help prompt the business into action.


source

 
quote
Originally posted by Shill:
no other devices can use those ip's correct?


Sadly no... DCHP is not design for security.
if he wait for a device to shut off or in sleep mode then a spoof MAC can uses that units IP. All your router see is X MAC on list needs IP assigns to it. Router Doesn't know if MAC is real or spoof. Spoofing is easy... All NIC driver have Network Address setting.

Leases just mean router will try to assign same IP to a MAC.
IP: Logged
Shill
Member
Posts: 2166
From: Spokane, WA
Registered: Apr 2009


Feedback score: N/A
Leave feedback

Rate this member

Report this Post12-31-2011 04:59 AM Click Here to See the Profile for ShillSend a Private Message to ShillDirect Link to This Post
 
quote
Originally posted by theogre:

Update...


Sadly no... DCHP is not design for security.
if he wait for a device to shut off or in sleep mode then a spoof MAC can uses that units IP. All your router see is X MAC on list needs IP assigns to it. Router Doesn't know if MAC is real or spoof. Spoofing is easy... All NIC driver have Network Address setting.

Leases just mean router will try to assign same IP to a MAC.


Still a lot of work to try and get in. what would he find? a few dirty pictures and some music?
IP: Logged
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-31-2011 11:54 AM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
 
quote
Originally posted by Shill:

Still a lot of work to try and get in. what would he find? a few dirty pictures and some music?


Your PC might not matter to a hacker but...
The above
anything help him w/ ID thief
general grieffer
a neighbor w/ axe to grind

he might be after your Internet connection to spam, illegal prn, hack another system.... so Cops come to you....

If you have WPA2 and strong and long pass-phrase then Experts says you be fine.
Turning off unused services will help too. I never use WPS and many others so I shut them off when I setup the router.

Use strong password for Router Admin too... Even more important because some Routers can't block WiFi from router's Admin Tools. Example Some models of Netgear is all or nothing blocking. Block Admin Tool then can't use local printers, NAS, windows shares, etc...

get passutil to make strong password.
or visit these to ideas
http://www.thegeekstuff.com...ng-strong-passwords/
http://strongpasswordgenerator.com/
http://www.microsoft.com/security/default.aspx check and create strong pw

IP: Logged
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-27-2012 12:45 PM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
Still use WPS?
An update....
 
quote
In the year since Viehböck published his paper, white-hat security hackers (especially the folks at Tactical Network Solutions; site: http://www.tacnetsol.com/ ) have adapted and expanded his proof-of-concept program, creating the free, open-source Reaver WPS hacking application (site: http://code.google.com/p/reaver-wps/ ).
Reaver is a completely legitimate security-testing tool anyone can use to see whether a router is vulnerable to WPS cracking. (It can, of course, also be used for malicious system cracking.)
And that's where the trouble lies; Reaver requires almost no networking knowledge, special skills, or unusual tools. Any digital delinquent with a Wi-Fi–enabled laptop, a copy of Reaver, and a couple of idle hours, can successfully crack your WPS-enabled network.

Source: Windows Secrets Newsletter • Issue 366 • 2012-12-13 • Free news email letter

Means You should disable WPS and use strong pass-phrases for admin and WiFi ASAP.

Remember Many G, all N and up, WPS is on by default even if you have strong pass-phrases. If you ever use factory reset then need to check the feature is turn off.
IP: Logged
Raydar
Member
Posts: 41432
From: Carrollton GA. Out in the... country.
Registered: Oct 1999


Feedback score:    (13)
Leave feedback





Total ratings: 463
Rate this member

Report this Post12-27-2012 01:10 PM Click Here to See the Profile for RaydarSend a Private Message to RaydarDirect Link to This Post
Fixed. Thanks!
Didn't realize that WPS and WPA/WPA2 could both be active at the same time.
IP: Logged
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-27-2012 02:08 PM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
 
quote
Originally posted by Raydar:
Didn't realize that WPS and WPA/WPA2 could both be active at the same time.

Yes, WPS is default active even when WPA2 etc is used.

Worse, By default WPS can/will reset WPA pass-phrase and SSID.
 
quote
Keep Existing Wireless Settings
This shows whether the router is in the WPS configured state.
If this option is not selected, {default setting in many units} adding a new wireless client will change the router's wireless settings to an automatically generated random SSID and security key.

Soucre: Netgear WNR3500L help on advance wireless settings

[This message has been edited by theogre (edited 12-27-2012).]

IP: Logged
Dodgerunner
Member
Posts: 9687
From: Lincoln, Nebraska
Registered: Sep 2004


Feedback score:    (61)
Leave feedback





Total ratings: 323
Rate this member

Report this Post12-27-2012 10:49 PM Click Here to See the Profile for DodgerunnerClick Here to visit Dodgerunner's HomePageSend a Private Message to DodgerunnerDirect Link to This Post
Funny this got updated today. I just setup a new Belkin wireless router today. When I started the setup I saw that the WPA default setting was enabled. Made sure to disable it first thing.

[This message has been edited by Dodgerunner (edited 12-27-2012).]

IP: Logged
spark1
Member
Posts: 11159
From: Benton County, OR
Registered: Dec 2002


Feedback score: (1)
Leave feedback





Total ratings: 175
Rate this member

Report this Post12-28-2012 12:09 AM Click Here to See the Profile for spark1Send a Private Message to spark1Direct Link to This Post
The DSL modem/router that I started using recently had WPS enabled also. No mention of the feature in the quick start guide and it was a couple of menus deep in the wireless security settings. The modem is an Actiontec GT784WN.

Here's what Actiontec mentions in their FAQ's:

 
quote
What is Actiontec doing about the industry wide issue of the (WPS) Wi-Fi Protected Setup PIN brute force vulnerability?

As of 1/31/2012 all future Actiontec products that have the (WPS) Wi-Fi Protected Setup feature in the firmware will also contain a WPS "lock-out" feature and/or any other Wi-Fi Alliance recommended improvements to the (WPS) Wi-Fi Protected Setup.


It was just a enable/disable selection on my modem, not sure of actual manufacture date, purchased in May, 2012.

[This message has been edited by spark1 (edited 12-28-2012).]

IP: Logged
PFF
System Bot
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-28-2012 04:26 AM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
 
quote
Originally posted by spark1:
The DSL modem/router that I started using recently had WPS enabled also. No mention of the feature in the quick start guide and it was a couple of menus deep in the wireless security settings. The modem is an Actiontec GT784WN.

Buried this feature is a surprise...
Is one that most makers will highlight for easy setup.

Yes, "purchased in May, 2012" but made when?
You can try checking/updating firmware...
if site or zip file doesn't list the fixes, Ask support to see what new firmware fixes.
My guess is no help there... current is GT784WN NCS01-1.0.8 dated 2011-09-30

Example I have 2 Belkin N models...
1 update is too old, 3/2011, and no notes
other is 11/2012 but only note is "Fixed issue where client MAC addresses could be visible over ICMP through the WAN connection."
If I use either... I would turn off WPS

My "current" Netgear WNR3500L firmware is too old to for fixing WPS problem. dated 12/11

Many makers just don't care on "old" products. Getting a firmware fix on many units won't happen.

Most consumer and SOHO WiFi build in last 8-10 years runs the feature. Even old units w/ update firmware often uses it. Example my old Linksys WRT54GS V1 got the feature when I update firmware.

New firmware may help stopping the hack (read article link above) but turning off is better.
Turning off may not work either because bug(s) in some firmware. (also in article)
Turning off SSID broadcast to be sure but killing SSID stops some devices getting a connection... like Wii and "smart" phones that won't connect w/o SSID enable on router.

Sadly the Reaver tool only is linux based and like many I have little Linux skills so hacking my own unit to test like not going to happen. (Reaver? I guess fans of Firefly...)
IP: Logged
James Bond 007
Member
Posts: 8872
From: California.U.S.A.
Registered: Dec 2002


Feedback score: (1)
Leave feedback





Total ratings: 263
Rate this member

Report this Post12-28-2012 10:40 AM Click Here to See the Profile for James Bond 007Send a Private Message to James Bond 007Direct Link to This Post
Crack this password. 汉语/漢語 华语/華語
IP: Logged
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post12-28-2012 02:00 PM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
 
quote
Originally posted by James Bond 007:
Crack this password. 汉语/漢語 华语/華語

Funny? not really.
1. Most routers and network devices won't accept Unicode fonts. Many Chinese etc fonts are UTF-16. Only basic ASCII... UC LC letters, numbers, and some symbols.
2. Admin or WiFi Password/pass-phrase is not an issue here. WPS uses 8 number pin to use the feature and often set at factory.

If/when WPS hack is run on you router...
when hack is successful, it will return your WiFi password in plain text w/o need to crack.
Worse, many use Admin PW = WiFi PW.

Does WiFi access list matters? maybe. If router runs list before WPS service respond maybe can stop Reaver tool. If someone has time to kill... spoofing mac is easy. Just wait for devices WiFi scanning to find the router. Scanning can happen every time device goes to sleep then wake up, etc. After that just wait for device goes to sleep again.

Remember... target likely not your network. Target is using you network to do most things illegal, Break/hack a business/bank, illegal images, etc. Always think low hanging fruit principle... You want to make other people to be lower than you.
IP: Logged
theogre
Member
Posts: 32520
From: USA
Registered: Mar 99


Feedback score: N/A
Leave feedback





Total ratings: 572
Rate this member

Report this Post01-13-2013 09:41 PM Click Here to See the Profile for theogreClick Here to visit theogre's HomePageSend a Private Message to theogreDirect Link to This Post
Update...

This shows you how to use Reaver w/ Linux boot disk at Windows Secrets

I haven't tested it yet.
IP: Logged



All times are ET (US)

T H I S   I S   A N   A R C H I V E D   T O P I C
  

Contact Us | Back To Main Page

Advertizing on PFF | Fiero Parts Vendors
PFF Merchandise | Fiero Gallery
Real-Time Chat | Fiero Related Auctions on eBay



Copyright (c) 1999, C. Pennock