News Centre

How to Hack WiFi Passwords With a Simple Newly Found Technique

Article by diogo@techpatrol.com.au
August 14, 2018

SHARE THIS POST:

WIFI Attack

Have you ever wondered how easy it would be to hack your neighbour or competitors WiFi?

Ever since Dr O’Sullivan’s original release of the Wi-Fi concept back in 1997. The systems have had an extreme impact on the consumption of the internet and with that impact, there has also been the negative side of Wi-Fi, the “Hackers Gate” which is referred to by cybercriminals across the dark web as it’s the gateway of information.

Jens ‘Atom’ Steube, the lead developer of the popular password-cracking tool hashcat, found a new hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers. The new WiFi hack works explicitly against WPA & WPA2 wireless network protocols with Pairwise Master Key Identifier (PMKID)-based roaming features that are enabled across the hardware.

The attack was accidentally discovered by Steube while he was analyzing the newly-launched WPA3 WiFi security standard. This new WiFi hacking method could potentially allow attackers to recover pre-shared key (PSK) login passwords, allowing cybercriminals (or even competitors) to hack into your Wi-Fi network and eavesdrop on the Internet communications.

How to Hack WiFi Password Using PMKID

how to hack wifi password software
Previously attackers had to wait for someone to log into a network and capture a full 4-way authentication handshake of EAPOL, which is a network port authentication protocol.  This has been a method used for over a decade across both WPA & WPA2.
The new attack, however, no longer requires this stack of a user needing to be on the target network to capture credentials. Instead, it is performed on the Robust Security Network Information Element (RSN IE) using a single Extensible Authentication Protocol over LAN (EAPOL) frame after requesting it from the access point.

Also Read: Simple ways of securing your guest Wi-Fi.

How does this work step-by-step?

A RSN (Robust Security Network)is a protocol for establishing secure communications over an 802.11 wireless network and has PMKID, the key needed to establish a connection between a client and an access point, as one of its capabilities.

Step 1 — An attacker can use a tool, like hcxdumptool (v4.2.0 or higher), to request the PMKID from the targeted access point and dump the received frame to a file.

$ ./hcxdumptool -o test.pcapng -i wlp39s0f3u4u5 –enable_status

Step 2 — Using the hcxpcaptool tool, the output (in pcapng format) of the frame can then be converted into a hash format accepted by Hashcat.

$ ./hcxpcaptool -z test.16800 test.pcapng

Step 3 — Use Hashcat (v4.2.0 or higher) password cracking tool to obtain the WPA PSK (Pre-Shared Key) password, and Bingo!

$ ./hashcat -m 16800 test.16800 -a 3 -w 3 ‘?l?l?l?l?l?lt!’

That’s the password of the target wireless network, cracking which may take time depending on its length and complexity.

“At this time, we do not know for which vendors or for how many routers this technique will work, but we think it will work against all 802.11i/p/q/r networks with roaming functions enabled (most modern routers),” Steube said.

This is a great finding, however, since the new hack technique only works against networks with roaming functions enabled and requiring attackers to brute force the password, users are recommended to protect their WiFi network with a secure password that not only is difficult to crack with the usual uppercase, lowercase, numbers and symbol… but also is constantly changing.

This new technique also does not work against next-generation wireless security protocol WPA3, since the new protocol is “much harder to attack because of its modern key establishment protocol called “Simultaneous Authentication of Equals” (SAE). If you don’t know how secure your WiFi is, contact us today for a free assessment.

Share your thoughts in the Comments section:

Subscribe For The Latest In Technology

Other Posts You May Like

TECH NEWS & UPDATES

Please enter your name.
Please enter a valid email address.
Something went wrong. Please check your entries and try again.

RECENT POSTS

Skype For Business to Microsoft Teams

What To Expect When Moving To Microsoft Teams From Skype For Business

Digital Transformation

The State of Digital Transformation In 2020

Windows 7 End of Life

Windows 7 END-OF-LIFE: What you need to know.

Tech Patrol PTY LTD

Microsoft Teams Becomes The Most Used Business Collaboration App in The World

White Paper

Enjoy this free eBook

Tech Patrol - Microsoft Office 365

White Paper (Why businesses Are Migrating to Cloud)

  • This field is for validation purposes and should be left unchanged.
how-to-hack-wifi-passwords-with-a-simple-newly-found-technique-tech-success
Scroll to Top