Skip to main content

标  题: WPA2加密协议被攻破!路由器等一大波设备遭殃

发信人: pathdream (求包养买保10洁), 信区: Hardware
标  题: WPA2加密协议被攻破!路由器等一大波设备遭殃
发信站: BBS 未名空间站 (Mon Oct 16 20:59:05 2017, 美东)

对于路由器来说,这绝对是一个悲催的消息,因为有黑客已经发现了能够轻松干掉WPA
或WPA2加密Wi-Fi网络的方法。
据外媒TheNextWeb报道称,攻击者在联网设备和无线接入点之间读取到无线通信协议,
甚至还能将其修改,把恶意软件嵌入到网站中,macOS、Windows、iOS、Android和
Linux都不能躲避这个漏洞。
WPA2加密协议被攻破!路由器等一大波设备遭殃
其实出现这个问题,也没有让我们太意外,因为WPA2加密协议已经服役差不多13年,其
被破解对于普通用户来说是难受的,因为攻击者不需要破解Wi-Fi密码,就可以轻松来
窃取用户的信用卡卡号、密码、聊天信息、照片、电子邮件以及在线通讯工具内容。
研究人员还强调,Android 6.0及以上版本系统都存在这个漏洞,而这种毁灭性的无线
网络攻击可以瞬间让41%的安卓设备挂掉,其通过读取无线网络流量的方式实现(利用
了WPA2协议4-way handshake的漏洞),并不针对接入点。
你更换WiFi密码是不能解决这个问题的,只能等待相应路由器客户端针对这个漏洞的更
新,当然还有其他设备的补丁更新。

Comments


  1. My name is Dr.Richards Edward. Am a Phrenologist in BLK Super Speciality Hospital. Our Hospital is specialized in Kidney Surgeries and we also deal with Buying and Transplantation of kidneys with a corresponding Donor. We are Located in Indian, UK and Malaysia. If you are interested in Selling or Buying Kidney’s please don’t hesitate to Contact us: email:blksuperspeciality@gmail.com
    Phone :+91868603853 for more info.

    ReplyDelete

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...