Linux Today: Linux News On Internet Time.

More on LinuxToday

Attack on WPA refined

Aug 28, 2009, 21:33 (0 Talkback[s])


Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers

"The aim of the attack is to determine the keystream for communication between the Access Point (AP) and the client – without knowledge of the original key. Further packets from the AP to the client can be decrypted with relatively little effort. With the keystream, attackers can encrypt their own packets and send them to a client, for instance to divert further traffic using falsified ARP or ICMP packets.

"Originally developed by Martin Beck and Erik Tews, the method is essentially a variant of the chopchop attack, which involves reconstructing the checksum of an intercepted packet, sending the packet to an access point, and observing whether the packet is accepted by the access point."

Complete Story

Related Stories: