*** WiFi password can be tampered with, from loopholes

With the rapid development of society, the city's wireless network all over the place, such as, first and foremost their own, usually access fiber network, and then travel transportation cars, trains, airplanes, etc., or Park Plaza, shopping malls, hotels there are all wireless networks, and some are password-free Wi-Fi connection can be used, then the security issues if they do? *** WiFi network will be eyeing it? The answer is yes.
 

*** WiFi password can be tampered with, from loopholes
 

*** Why is eyeing WiFi network? *** The main occupation is to obtain benefits, they will not be tampered with for pure fun to WiFi password or a simple rub network. The WiFi security issues may cause leakage of important personal information, some people may say that they are thinking of the general public one, and there is no important information, he can not get anything. In fact, not entirely, they can get your identity, bank account numbers, passwords and so on. Identity information leakage may be criminals used for criminal activity, or online loan and so on, the end result is I need to take the identity information. And some important people, mobile phones, computers there will be many companies important core data, if it could be used to steal *** blackmail victim or sold to competitors and announced to the public, thus giving the future of the business at risk. I am sure you are wondering, how can tamper *** WiFi password?
 

*** how you can tamper with WiFi password?


Today ink security in the browser FreeBuf process, foreign media saw an article about WPA3 WiFi, there were two new vulnerabilities articles, WPA WiFi access protection agreement is Advanced Encryption Standard security. This protocol is mainly used for authentication, and wireless data protection *** steal the user's wireless device. WPA3 agreement is the introduction of a new version of the standard soon. However, security researchers create alleviate Dragonblood *** is the discovery of two new vulnerabilities. *** These two new vulnerabilities allow those who leak information from WPA3 cryptographic operations, and forced to use a WiFi network password.
The first vulnerability is CVE-2019-13377, the researchers showed that the use Brainpool curve will be introduced next to the branch channel leakage WPA3 dragonfly style handshake, forced to enter a password when using the leaked information simultaneously.
The second vulnerability is CVE-2019-13456, there is information leakage EAP-pwd authentication process on a number of devices supported by freeradias, which allows *** who recover the password.

Protocol is mainly used for authentication, and wireless data protection *** steal the user's wireless device

For more than two vulnerability information, and researchers said it had reported the WiFi Alliance. And now under the proper standard WiFi upgrade, I believe you can prevent more ***, so everyone in the network when using WiFi, will feel safe and secure and reliable. Since the rise of things, need to use the local network anytime, anywhere, smart home is the best description. There are networks but also to prevent traffic ***, DDoS defense well in advance.

Guess you like

Origin blog.51cto.com/14445790/2426803