Israel Researcher Cracked 70% Of WiFi Networks Sampled

Share post:

An Israeli researcher was able to crack 70% of 5,000 WiFi networks in Tel Aviv, showing that home networks are extremely vulnerable and easy to hijack.

Ido Hoorvitch, a security expert at CyberArk, first roamed downtown with WiFi sniffing devices to collect about 5,000 network hashes for his research.

Next, the researcher tapped into a vulnerability that made it possible to find a PMKID hash that is normally used for roaming.

The PMKID hash leads to the compromising of the network’s SSID, the passphrase, the MAC address, and a static integer. The researcher collected PMKIDs that were to be cracked to derive the password via a previously discovered method from Jens “atom” Steube’s leading developer Hashcat.

In order to crack the passwords, all number options for Israeli phone numbers had to be calculated with ten digits, starting with 05, thus making it only eight digits.

Using this method, the researcher was able to crack 2,200 passwords at an average speed of nine minutes per password on a normal computer.

The next stage of the attack was a standard dictionary attack using the ‘Rockyou.txt’ dictionary, which led to a quick cracking of another 1359 passwords, most of which were lowercase.

In total, Hoorvitch cracked a staggering 70% of the passwords for the sampled WiFi networks. The research clearly shows that most people do not use strong passwords for their Wi-Fi networks, which puts them at high risk of being hacked.

Strong and secure passwords should be at least ten characters long and contain a combination of lower and upper case letters, as well as symbols and numbers. In addition, users are advised to disable both roaming and WPS because they are trading security for convenience.

For more information, read the original story in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 29, 2024 – PyPI repository shuts to stop malicious uploads, a plea to developers to stop creating apps with SQL...

This episode reports on a US$10 million reward for a ransomware gang, a new Linux version of a backdoor

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways