WPA Security Standard Hacked

Two graduate students/researchers have cracked the WPA security standard, opening the door to additional wireless attacks.

Lavon Peters

November 12, 2008

1 Min Read
ITPro Today logo

This week at PacSec, the applied security conference in Tokyo, two graduate students named Erik Tews and Martin Beck plan to release the details of how they managed to crack the Wi-Fi Protected Access (WPA) security standard. Tews’s and Beck’s attack currently targets only Temporal Key Integrity Protocol (TKIP)-protected networks, and it can only inject traffic—not steal data. However, the attack in and of itself raises serious issues for security administrators. Because this attack lets intruders scan data from the router to the PC, a hacker could send bogus information to a client machine on the network. In addition, an attack of this nature, which Tews and Beck claim to have pulled off in under 15 minutes, opens the door to additional and more serious forms of wireless attacks in the future.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like