IronWing
No Lifer
- Jul 20, 2001
- 72,834
- 33,876
- 136
ChangeMe123!lol, why wouldnt I, is someone gonna guess my super hard password?
ChangeMe123!lol, why wouldnt I, is someone gonna guess my super hard password?
lol, why wouldnt I, is someone gonna guess my super hard password?
It'll expose traffic between the unsecured client (unpatched phone) and the router/AP/VLAN. Technically this could expose unencrypted traffic between the unpatched device and a patched device, just between the unpatched device and the AP, rather than the patched device and the AP. Think of a scenario involving telnet between hostA and hostB, hostB is patched, hostA isn't, and AP between them is patched. HostA to AP traffic can be sniffed, and telnet cleartext can be extracted.
Since most phones don't get patches beyond, oh, 3 months or so, it's probably safe to assume any unencrypted/non-broken encryption (see various implementations of SSL/TLS) is potentially cleartext'd by this in a public environment.
lol, why wouldnt I, is someone gonna guess my super hard password?
I actually find it amusing people broadcast their SSID. But they must be blissful.
That's going to be a nightmare for anyone that runs a public wifi hotspot.
No need to guess when it's just being sent around in clear text if an unpatched client connects to you.![]()
lol, why wouldnt I, is someone gonna guess my super hard password?
No need to guess when it's just being sent around in clear text if an unpatched client connects to you.![]()
Seriously though, when I show people my password method they be like
So yea, try to get on my SSID
yes, both. its actually leetloveDoes it have any combination of leet in it or the word love?
It makes life easier, and hiding it doesn't do anything. Someone looking to crack a network can see it, and everyone else who doesn't matter, doesn't matter.I actually find it amusing people broadcast their SSID. But they must be blissful.
yes, both. its actually leetlove
Until you see nondescript white vans going up and down your street. Too risky, IMHO.Use a third party router firmware and use a non-US WIFI channel. This will cut down on the hackers in no time!
Until you see nondescript white vans going up and down your street. Too risky, IMHO.
I think people are getting confused here.On the wireless side we have two phones - both on Android, a laptop, printer, PS4 & Switch. So patch up Android and the laptop and I guess wait for the PS4 and Switch to be updated?
Maybe I will just bite the bullet and put DD-WRT on the router. It's already patched I believe, or it is coming shortly. I read something of the sort on reddit.
Note from the krackattacks.com site:
Our main attack is against the 4-way handshake, and does not exploit access points, but instead targets clients. So it might be that your router does not require security updates. We strongly advise you to contact your vendor for more details. In general though, you can try to mitigate attacks against routers and access points by disabling client functionality (which is for example used in repeater modes) and disabling 802.11r (fast roaming). For ordinary home users, your priority should be updating clients such as laptops and smartphones.
https://www.krackattacks.com
I already patch my Ubiquiti WAP.
its up to manufacturers to push it to devices. More to come, but read the page, watch the video, and hide yo babies.
ssh admin@wap01.n.loc
admin@wap01.n.loc's password:
BusyBox v1.11.2 (2017-10-13 10:45:54 PDT) built-in shell (ash)
Enter 'help' for a list of built-in commands.
___ ___ .__________.__
| | |____ |__\_ ____/__|
| | / \| || __) | | (c) 2010-2017
| | | | \ || \ | | Ubiquiti Networks, Inc.
|______|___| /__||__/ |__|
|_/ http://www.ubnt.com
Welcome to UniFi UAP!
BZ.v3.9.3#