- Joined
- Mar 31, 2007
- Messages
- 1,895 (0.30/day)
- Location
- ontario canada
System Name | home brew |
---|---|
Processor | Intel Corei7 3770K OC @ 4.5Ghz |
Motherboard | ASUS P8Z77-V |
Cooling | Corsair H100 |
Memory | 16GB DDR3 1600 GSKILL |
Video Card(s) | Powercolor Radeon 7970, MSI Radeon 7970 |
Storage | Mushkin Chronos Deluxe 240gb. 2 TB Hdd. |
Display(s) | 3x24inch Dell Ultra IPS |
Case | CM storm trooper |
Power Supply | Antec Quattro OC ed. 1200w |
Software | Windows 7 Business x64 |
Benchmark Scores | vantage: P43089 |
Thought this to be interesting. You can use it to test your wireless security. It probably won't work as easily if you use central auth for wireless.
Rest of the article:http://blogs.techrepublic.com.com/security/?p=4097&tag=results;CR1
Rest of the article:http://blogs.techrepublic.com.com/security/?p=4097&tag=results;CR1
In 2008, I speculated about the future of distributed security cracking. That future has arrived, in the form of a $17 “cloud” based service provided through the efforts of a security researcher known as Moxie Marlinspike. It is effective against pre-shared key deployments of both WPA and WPA2 wireless networks.
The mechanism used involves captured network traffic, which is uploaded to the WPA Cracker service and subjected to an intensive brute force cracking effort. As advertised on the site, what would be a five-day task on a dual-core PC is reduced to a job of about twenty minutes on average. For the more “premium” price of $35, you can get the job done in about half the time. Because it is a dictionary attack using a predefined 135-million-word list, there is no guarantee that you will crack the WPA key, but such an extensive dictionary attack should be sufficient for any but the most specialized penetration testing purposes.
If you opt to use the service, you will of course leave a money trail via Amazon Payments — which is probably a bad idea if you are attempting to gain unauthorized access to a secured network illegally. For the good guys testing the security of a client’s network, however, this is an incredibly handy tool to have at one’s disposal.
It gets even better. If you try the standard 135-million-word dictionary and do not crack the WPA encryption on your target network, there is an extended dictionary that contains an additional 284 million words. In short, serious brute force wireless network encryption cracking has become a retail commodity.