Skip to main content

Network routers with roaming enabled are likely susceptible to a new attack

Hashcat creator Jens Steube accidentally discovered a new method to break into network routers while researching new ways to attack the new WPA3 security standard. He stumbled onto an attack technique capable of cracking hashed passwords based on the Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) security protocol.

For starters, WPA is a mechanism in wireless networking that encrypts and decrypts data passed between the router and a connected device. The PSK aspect applies to the network’s password or passphrase, as the router creates a unique 256-character key that is shared between both devices. These keys change periodically to prevent hackers from infiltrating the network.

Recommended Videos

In a typical attack, the hacker must be in the range of a router and a connecting wireless device, and patiently wait for the latter device to log onto the network. When the wireless device begins the connection process, the hacker must run a tool in the exact same moment to capture the full four-way “authentication handshake” made between the router and the device.

Please enable Javascript to view this content

That’s not the case in the new attack. With this method, the hacker needs only a small portion of the handshake called the Robust Security Network Information Element (RSN IE). Even more, the hacker can connect directly to the router and access the needed data rather than lurk in the background and wait for someone to connect.

“At this time, we do not know for which vendors or for how many routers this technique will work, but we think it will work against all 802.11 i/p/q/r networks with roaming functions enabled (most modern routers),” Steube says.

The login aspect of connecting a wireless device to a router consists of a set number of steps or frames. The RSN IE is an optional field within one of those steps that contains the Pairwise Master Key Identifier, a networking component that verifies that both the router and wireless device know the PSK-based password. This component is the new method’s attack vector, retrieving the stored PSK-based password.

According to Steube, the attack requires three available tools: Hcxdumptool v4.2.0 or higher, Hcxtools v4.2.0 or higher, and Hashcat v4.2.0 or higher. The first tool on the list grabs the necessary connection frame and dumps it into a file. The second tool converts the saved data into a format that can be read by Hashcat. This third tool cracks the encryption.

Ultimately, this method reduces the time used to access the stored passwords but doesn’t lessen the time needed to crack the encryption protecting these passwords. The cracking duration depends on the password complexity, thus if router owners never change the password from the factory default, the password should take no time to crack.

To better protect yourself from a possible attack, change the default password on your router. Using your own password is supposedly better than allowing the router to create one for you, and always use a variety of characters: Lower and upper-case letters, numbers, and symbols. If you’re not great at remembering passwords, Steube suggests using a password manager.

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
Anthropic Claude is evolving into a web search tool
The Anthropic logo on a red background.

Anthropic has thrown its hat in the race to establish an AI-based web search feature, which it announced on Thursday.

The feature is based on Anthropic’s Claude 3.7 Sonnet model and integrates web search into the chatbot tool. You can enable the feature in your profile settings. With an AI prompt, you will receive contextual results with search engine sources included, instead of just the link options you would receive in a standard search result. The web search feature will be available, first to paid U.S. customers and will roll out to additional users at a later time.

Read more
AMD dominates Amazon CPU sales, but Intel still fights back
The Ryzen 7 9800X3D sitting on a motherboard.

Although the market share would tell you otherwise, the battle between AMD and Intel is quite fierce right now, and it's AMD that often tops the list of the best processors in the last couple of years. Intel, while it holds a bigger part of the CPU market, is less of a go-to for gamers than AMD these days, and this is reflected in Amazon sales. Just yesterday, AMD held the top 15 spots on the list of Amazon's CPU best sellers. Today, Intel is making its way back.

As spotted by TechEpiphany on X (Twitter), AMD really dominated Amazon CPU sales just recently. Every single CPU in the top 15 belonged to AMD, with Intel nowhere to be seen. Surprisingly, the top processor turned out to be the Ryzen 7 9800X3D, which is a favorite among gamers.

Read more
AMD GPUs are supposed to be plentiful, but good luck finding one
Various AMD RX 9000 series graphics cards.

It's clear that AMD hit the jackpot with its recent RX 9070 XT and non-XT GPUs. The pair quickly climbed up every list of the best graphics cards, and perhaps more importantly, received a warm welcome from the GPU market at large (and thus sold out immediately). A new leak tells us that AMD is shipping lots of GPUs to try to keep up with the demand -- and yet they're still not in stock.

The information comes from Moore's Law Is Dead on YouTube, who claims to have spoken to a major online retailer about RDNA 4 stock levels. Both Nvidia and AMD have been in a pretty dire place since the release of their latest graphics cards, with many people referring to the RTX 50-series as a "paper launch." The cards just sell out too quickly and too many people are left trying to find one.

Read more