Wi-Fi

Expert hacked 70% of Wi-Fi networks in Tel Aviv for research

CyberArk specialist Ido Hoorvitch hacked 70% of Wi-Fi networks in his native Tel Aviv, seeking to prove that home networks are poorly secured and easily compromised. o conduct the experiment, Horwich walked around town with sniffing equipment and collected data from 5,000 network hashes. Next, he exploited a vulnerability to obtain the PMKID hash normally generated for roaming. The PMKID hash consists of the network SSID, passphrase, MAC address, and a static integer. To get the PMKID hashes, he used a $ 50 AWUS036ACH ALFA NIC, which could act as both a monitor and a packet injection tool, and then analyzed them using WireShark in Ubuntu. Using the method of Jens “atom” Steub (lead developer of Hashcat), Horwich collected PMKIDs, …

Expert hacked 70% of Wi-Fi networks in Tel Aviv for research Read More »

hacked Wi-Fi in Tel Aviv

Manufacturers release patches for Frag Attacks problems

Manufacturers of various Wi-Fi-enabled equipment and software developers for this equipment release patches for Frag Attacks problems. et me remind you that last week the details of twelve vulnerabilities were disclosed, collectively called Frag Attacks (Fragmentation and aggregation attacks). These problems were discovered and described by the well-known information security expert Mathy Vanhoef. All Wi-Fi enabled devices (computers, smartphones and smart devices) released after 1997 are vulnerable to Frag Attacks. Bugs allow an attacker in range of Wi-Fi to collect information about the owner of the device and execute malicious code. Even worse, the vulnerabilities are relevant even if WEP and WPA protection is active. The researcher demonstrates the attack on unpatched Windows 7 in the video below. Vanhof writes …

Manufacturers release patches for Frag Attacks problems Read More »

patches for Frag Attacks problems

Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues

The well-known information security expert Mathy Vanhoef reported the discovery of a whole set of vulnerabilities named Frag Attacks (Fragmentation and aggregation attacks), which affect all devices with Wi-Fi support, released after 1997 (computers, smartphones and “smart” devices). et me remind you that earlier Vanhof discovered such dangerous vulnerabilities as KRACK and Dragonblood, which significantly improved the security of the Wi-Fi standard. Frag Attacks issues allow an attacker to gather information about the device’s owner and execute malicious code. Even worse, the vulnerabilities are relevant even if WEP and WPA protection is active. The researcher demonstrates the attack on unpatched Windows 7 in the video below. Vanhof writes that the three vulnerabilities are design flaws in the Wi-Fi 802.11 standard, …

Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues Read More »

Wi-Fi Devices and Frag Attacks

AIR-FI attack turns RAM into a makeshift Wi-Fi signal source

Experts from Israel’s Ben-Gurion University have demonstrated the AIR-FI attack, which turns RAM into Wi-Fi. In fact, this is a new method of extracting data from machines that are physically isolated from any networks and potentially dangerous peripherals. Such computers are often found in government systems and corporate networks, they store secret documents, as well as classified and confidential information. This time, the researchers proposed turning the RAM into an impromptu wireless emitter for transmitting data “over the air.” Since Wi-Fi is radio waves, which is very close to electromagnetic waves, the researchers write that, in theory, a hacker can manipulate the RAM power to generate electromagnetic waves with a frequency corresponding to the frequency of the Wi-Fi signal (2.4 …

AIR-FI attack turns RAM into a makeshift Wi-Fi signal source Read More »

AIR-FI turns RAM into Wi-Fi
Scroll to Top