How vulnerable is your good router for gaming?

Comments · 197 Views

The ironic thing is that home Wi-Fi good router for gaming don't need to broadcast PMKIDs. 

How vulnerable is your good router for gaming?

The ironic thing is that home Wi-Fi good router for gaming don't need to broadcast PMKIDs.

These types of IDs are mainly used in workplaces and other large environments in which devices laptops, smartphones roam about and seamlessly connect to and disconnect from multiple good router for gaming access points that are part of the same good router for gaming network.

Nonetheless, PMKID distribution is turned on by default in many home Wi-Fi routers, although we weren't able to find any indication that it was activated on our own aging Netgear router. (One way to check is to see if "802.11r", the specification that defines PMKID, is enabled or mentioned in your home router administrative interface.)

PMKID would be on for many of the workplace Wi-Fi networks that Hoorvitch sniffed.

"Not all routers support roaming features and are, therefore, not vulnerable to the PMKID attack," he wrote. "However, our research found that routers manufactured by many of the world's largest vendors are vulnerable."

Unfortunately for us, he didn't provide a list of those good router for gaming vendors.

Taking apart the passwords
Because many Israelis just use their cellphone number as passcodes, this gave him a head start. He said Israeli cell numbers are all 10 digits that invariably begin with "05," leaving only eight digits 100 million possible numerical combinations to be calculated. One hundred million is a big number to a human, but it's nothing to a powerful late-model PC.

Using the cellphone-number method, Hoorvitch was able to figure out 2,200 44% of the Wi-Fi access passcodes in his sample set. That's kind of insane.

For the remaining 2,800 uncracked passcodes, Hoorvitch attacked them with the passwords in the RockYou list. That's a freely available text file containing more than 14 million unique passwords that in 2009 were stolen (from a company that developed Facebook and MySpace widgets) and then dumped online by hackers.

Twelve years later, the most often used passwords in the RockYou list "123456," "12345," "123456789," "password," "iloveyou" and so on are still among the most often used passwords in English-speaking countries.

Using the RockYou list, Hoorvitch was able to crack an additional 1,359 Wi-Fi access passwords, 26% of the total sample size. That left only 30% of the passwords uncracked.

Comments