An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2
Document Type
Conference Proceeding
Publisher
ECU Security Research Insitute
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Security Science
RAS ID
14876
Abstract
Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way. However, in December 2011 it was discovered that a brute force attack exists that reduces the WPS key space from 108 to 104+103. This resulted in a proof of concept tool that was able to search all possible combinations of PINs within a few days.This research presents a methodology to test wireless devices to determine their susceptibility to the external registrar PIN authentication design vulnerability. A number of devices were audited, and the Linksys WRT160N v2 router was selected to be examined in detail. The results demonstrate that the router is highly susceptible to having its WPN PIN brute forced. It also details that even with WPS disabled in the router configuration, WPS was still active and the PIN was equally vulnerable.
DOI
10.4225/75/57b5554fcd8d5
Access Rights
free_to_read
Comments
Aked, S. , Bolan, C. M., & Brand, M. W. (2012). An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2. Proceedings of The 10th Australian Information Security Management Conference. (pp. 28-35). Western Australia. Perth, Australia. ECU Security Research Institute. Available here.