Title

An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2

Document Type

Conference Proceeding

Publisher

ECU Security Research Insitute

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Security Science

RAS ID

14876

Comments

This article was originally published as: Aked, S. , Bolan, C. M., & Brand, M. W. (2012). An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2. Proceedings of The 10th Australian Information Security Management Conference. (pp. 28-35). Western Australia. Perth, Australia. ECU Security Research Institute. Original article available here.

Abstract

Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way. However, in December 2011 it was discovered that a brute force attack exists that reduces the WPS key space from 108 to 104+103. This resulted in a proof of concept tool that was able to search all possible combinations of PINs within a few days.This research presents a methodology to test wireless devices to determine their susceptibility to the external registrar PIN authentication design vulnerability. A number of devices were audited, and the Linksys WRT160N v2 router was selected to be examined in detail. The results demonstrate that the router is highly susceptible to having its WPN PIN brute forced. It also details that even with WPS disabled in the router configuration, WPS was still active and the PIN was equally vulnerable.

DOI

10.4225/75/57b5554fcd8d5

Access Rights

free_to_read

Share

 
COinS