2 dollars an hour with amazon cloud servers, the right software and the right dictionaries there are hundreds of proof of concept videos online
My buddy does that with his mac constantly just for fun
Your buddy is cracking AES with a desktop computer? Can you note what package he is using?
Even with some significant horsepower, beyond what a person could buy on a conmercially shared machine, this would be quite a surprise unless an AES vulnerability has slipped by me. Which is definitely possible.
Though I'm not sure that a person would need to break AES to sneak into a router in most places. Based on low level passes over places like Martinsville, there are thousands of more readily accessible access points.
MAC addresses are easy to spoof. You need to run wpa2 with AES only to be secure.
This is exactly right, although it'll only be a matter of time before these security algorithms flaws will be discovered.
If you really want to split hairs, you can get into the matter of brute forcing wifi, Taking the router down and acting like you're the AP itself will cause clients to connect to YOU instead of the AP.
No way really to be secure and I doubt many people put multiple layers of their network together " trusted, DMZ and wifi area's".
Cracking WPA2 with AES is very difficult... I've tried for work, running on high end servers and couldn't do it after 14 days.
Brute forcing any type of encryption is tough, unless there is a published vulnerability, : see WEP.
There are many other methods that allow one to gain access to an internal WIFI network, I'd rather exploit other area's of the network than do this.
Truth is, how many *real* crackers are out there trying to get in your wifi network? Most people look for open wifi area's and wouldn't even know how to crack WEP if their life depended on it, ( even though a skilled person could generate enough IV's to crack WEP in a matter of minutes ).
Even WEP is ok for most home networks.
If you REALLY want to get crazy, build a proper network with a managed switch and a nice router like PFSense, THEN use RADIUS + TKIP authentication, lock down your device certs to which client's you'd prefer to be issued a cert.
This is fairly full proof.
Snowman: these are good steps you're taking, albeit not broadcasting SSID's only keeps normal users at bay.
The storys and things I could tell about driving through an IWU campus with my old laptop.. could probably get most of those girls expelled.
The more packets your able to pick up the easier it gets.
Not in the case of WPA2. One needs only a handshake, which makes capturing the appropriate traffic a binary thing.
Handshakes are simple to get but without a stock ESSID and dictionary password I don't see them being brute forced.
The tool you mentioned earlier (I assumed you meant aircrack-ng) can be used to force wireless clients off the network so that a person sniffing the traffic can watch them reattach and capture the handshake that occurs when they do.
That is all that is needed to determine the keys the network is using. Getting from there to the actual key is the time consuming part, because there are no vulnerabilities in AES. That I know of anyway.
The tool you mentioned earlier (I assumed you meant aircrack-ng) can be used to force wireless clients off the network so that a person sniffing the traffic can watch them reattach and capture the handshake that occurs when they do.
That is all that is needed to determine the keys the network is using. Getting from there to the actual key is the time consuming part, because there are no vulnerabilities in AES. That I know of anyway.
This day and age it's overwhelmingly easy to do these things, so what happens when you actually rely on encryption and your home gets raided because of a rogue pervert?