Questions?  Comments?

WPS Vulnerabilities in the WPA encryption protocol (Cracking WiFi Passwords)


Article by Brandon Zwick, Owner of Zwick Tech Labs


‚ÄčThe WPS protocol is implemented by a nice little button on the side of many modern routers which allows various wireless devices to connect seamlessly by the press of a button.  It adds a lot of convenience since, once you signal you want to pair your device, you simply press the button on your router to automatically pair the two devices together without remembering lengthy passwords.  However, DON'T USE IT!!  In fact, if you even have it enabled in the settings on your router you are at risk.  You must log directly onto the router to disable it.  If you need help disabling it feel free to email us at support@zwicktechlabs.com and we will give you general information for free on how to do this.  Basically how this sort of black hat hacking works is that during a WPS transmission (ie. by pushing the button) the password is not transmitted, but rather a two-part numerical key is transmitted.  The first part is explicitly transmitted and the other part is obtained automatically.  This means there is a limited number of numerical values the password can be.  Therefore the first part can be "guessed" through a brute force attack and the second part of the key is then automatically generated.  By using a simple program a hacker can crack your WiFi key within a matter of hours.  Once they have your password they can log into your router and employ other attacks such as maliciously shutting down your router, or more likely, sit back and watch your activity so they can gain personal information.  I have experimented around with various programs and have successfully hacked our own network at Zwick Tech Labs via this method.  It is very easy to do if you know how to.  Please make sure you are protected!    

With increasing technology comes increasing dangers associated with it.  Here at Zwick Tech Labs, the Medon Research Division is dedicated to researching modern hacking methods deployed by hackers and informing you of the dangers and advising you how best to protect yourself.  We have your back in the digital world.  Feel free to browse the articles below for more information.

Medon Research Division