Skip to main content

Network routers with roaming enabled are likely susceptible to a new attack

Hashcat creator Jens Steube accidentally discovered a new method to break into network routers while researching new ways to attack the new WPA3 security standard. He stumbled onto an attack technique capable of cracking hashed passwords based on the Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) security protocol.

For starters, WPA is a mechanism in wireless networking that encrypts and decrypts data passed between the router and a connected device. The PSK aspect applies to the network’s password or passphrase, as the router creates a unique 256-character key that is shared between both devices. These keys change periodically to prevent hackers from infiltrating the network.

In a typical attack, the hacker must be in the range of a router and a connecting wireless device, and patiently wait for the latter device to log onto the network. When the wireless device begins the connection process, the hacker must run a tool in the exact same moment to capture the full four-way “authentication handshake” made between the router and the device.

That’s not the case in the new attack. With this method, the hacker needs only a small portion of the handshake called the Robust Security Network Information Element (RSN IE). Even more, the hacker can connect directly to the router and access the needed data rather than lurk in the background and wait for someone to connect.

“At this time, we do not know for which vendors or for how many routers this technique will work, but we think it will work against all 802.11 i/p/q/r networks with roaming functions enabled (most modern routers),” Steube says.

The login aspect of connecting a wireless device to a router consists of a set number of steps or frames. The RSN IE is an optional field within one of those steps that contains the Pairwise Master Key Identifier, a networking component that verifies that both the router and wireless device know the PSK-based password. This component is the new method’s attack vector, retrieving the stored PSK-based password.

According to Steube, the attack requires three available tools: Hcxdumptool v4.2.0 or higher, Hcxtools v4.2.0 or higher, and Hashcat v4.2.0 or higher. The first tool on the list grabs the necessary connection frame and dumps it into a file. The second tool converts the saved data into a format that can be read by Hashcat. This third tool cracks the encryption.

Ultimately, this method reduces the time used to access the stored passwords but doesn’t lessen the time needed to crack the encryption protecting these passwords. The cracking duration depends on the password complexity, thus if router owners never change the password from the factory default, the password should take no time to crack.

To better protect yourself from a possible attack, change the default password on your router. Using your own password is supposedly better than allowing the router to create one for you, and always use a variety of characters: Lower and upper-case letters, numbers, and symbols. If you’re not great at remembering passwords, Steube suggests using a password manager.

Editors' Recommendations

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
M4 chip: here’s everything we know about Apple’s latest silicon
Official render of Apple's M4 chip.

Apple has just announced a new slate of iPads, including an updated iPad Pro. What has that got to do with the M4 chip? Quite a lot, as those iPad Pro tablets come equipped with the M4, shockingly enough. That gives us plenty of information on what the chip might be capable of -- and what it could be like when it finally arrives in the Mac.

But while Apple spilled the beans on the M4 in its iPad range, concrete details on how that chip will affect the Mac are few and far between. If you feel adrift without a compass and want to know what to expect, you’re in the right place. We’ve gathered up all the latest M4 chip rumors and known information in one place.
Price and release date

Read more
Here’s why M4 MacBooks were a no-show — and when they’re coming
A person holds a MacBook Air at Apple's Worldwide Developer's Conference (WWDC) in 2023.

Apple has just released a new iPad Pro with a shocking surprise -- it includes the M4 chip rather than making the more standard upgrade to the M3. It's the first time we've seen an iPad debut the latest M-series Apple Silicon rather than a Mac, which may leave us Mac fans wondering what's going on.

So, what's the deal? Don't worry -- M4 Macs are surely on the way, but these new iPad Pros have thrown in a wrench into the conventional timeline.
The missing M4 Macs

Read more
A new standard is raising the bar for HDR on PC
Cyberpunk 2077 running on the Samsung Odyssey OLED G8.

HDR is about to get a big upgrade on PC. The Video Electronics Standards Association (VESA), the nonprofit group behind standards like DisplayPort and Adaptive Sync, is releasing a new specification for its DisplayHDR standard. DisplayHDR 1.2 not only introduces several new tests for validation, but it also raises the baseline requirements for monitors to earn the coveted badge.

Nearly every aspect of the certification has been tweaked, and several new tests are now a part of the process. VESA tells me this change is meant to reflect where displays are in 2024. DisplayHDR was first introduced seven years ago, and the price of monitors with the badge has more than halved during that time. DisplayHDR 1.2 raises the bar.

Read more