Advertentie | |
|
![]() |
||
Citaat:
![]() ![]() ![]() ![]() Prachtig. Die huilende vrouwen, die gast in zn boxer ![]()
__________________
Voor het onrecht is het bij mij kwaad kersen eten.
|
![]() |
||
Verwijderd
|
Citaat:
![]() |
![]() |
|
.sann naamzoek!
Jij keek beide programma's ook toch? ![]()
__________________
*danst met bob the bear*
|
![]() |
||
Verwijderd
|
Citaat:
![]() |
![]() |
|||
Citaat:
Citaat:
![]() Wat is het risico dan?
__________________
'I adore simple pleasures,' said Lord Henry. 'They are the last refuge of the complex.' - The Picture of Dorian Gray
|
![]() |
|||
Verwijderd
|
Citaat:
Citaat:
![]() http://techlogon.com/2012/01/04/wps-...twork-at-risk/ http://www.pcpro.co.uk/realworld/374...-wi-fi-network tl;dr In practise, the WPS standard is flawed because, if an attacker takes a guess at the 8 digit PIN, the router responds by confirming whether the first 4 digits are correct or not. This is very bad as it means that an attacker can just brute force attack the first 4 numbers until the router confirms they are correct – as there are only 10,000 possible combinations of the first 4 numbers, it is relatively simple to hack them in just a few hours. Even worse, the 8th digit is a checksum of the whole PIN so this digit is easily calculated too. Now an attacker knows the first 4 and the last digit – that only leaves the middle 3 digits left to guess. As there are only 1000 possible combinations of these 3 digits, it is a piece of cake to guess those too! So an attacker could crack all 8 digits in just a few hours (not years) and the router will then let the attacker access your wireless network – exactly what WPS security was designed to prevent! Verder kan je Googlen op 'WPS security risk/hole/etc' voor meer ![]() Laatst gewijzigd op 04-06-2013 om 10:39. |
![]() |
||
Verwijderd
|
Citaat:
![]() |
![]() |
Topictools | Zoek in deze topic |
|
|