安全研究员Erik Tews说他们发现了一个方法可以快速的破解曾经认为安全的WPA Wi-Fi加密,从而可以轻易的盗取无线网络的数据。 Erik Tews暂时没有透漏具体的攻击方式,下星期将在东京PacSec会议上现场演示 ... 安全研究员Erik Tews说他们发现了一个方法可以快速的破解曾经认为安全的WPA Wi-Fi加密,从而可以轻易的盗取无线网络的数据。
Erik Tews暂时没有透漏具体的攻击方式,下星期将在东京PacSec会议上现场演示破解过程。
Security researchers say they’ve developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.
The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will show how he was able to crack WPA encryption, in order to read data being sent from a router to a laptop computer. The attack could also be used to send bogus information to a client connected to the router.
To do this, Tews and his co-researcher Martin Beck found a way to break the Temporal Key Integrity Protocol (TKIP) key, used by WPA, in a relatively short amount of time: 12 to 15 minutes, according t
Erik Tews暂时没有透漏具体的攻击方式,下星期将在东京PacSec会议上现场演示破解过程。
Security researchers say they’ve developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.
The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will show how he was able to crack WPA encryption, in order to read data being sent from a router to a laptop computer. The attack could also be used to send bogus information to a client connected to the router.
To do this, Tews and his co-researcher Martin Beck found a way to break the Temporal Key Integrity Protocol (TKIP) key, used by WPA, in a relatively short amount of time: 12 to 15 minutes, according t