this post was submitted on 23 Jul 2024
228 points (98.7% liked)
Technology
59673 readers
3249 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I don’t believe this is the case. 3 is fairly robust, and 2 is still just brute forcing, though rapidly on a local CPU. The one that’s trivial is trivial to crack is WEP.
WPA2 is pretty trivial too. Not as easy as WEP since you do have to locally brute-force the PSK (password), but that's pretty quick on modern systems. We had multiple assignments when I was in college that had cracking a WPA2 password as a step (in the interest of time, the instructor used passwords from the RockYou list but still)
Yeah, if you’re using common words or variants thereof, you’re gonna have a bad time. But a 128 character string of random characters is going to be functionally safe from such an attack, for now.
And you'll go crazy every time you try to add a device that doesn't support QR code scanning.
Just use multiple dictionary words with a symbol or two thrown in. Or go all out and set up 802.1x with client certificates and save the PSKs for a firewalled segment of less important crap.
Although it's worth mentioning that wireless security means nothing to jamming. Jamming is RF, it's destroying layer 1 before WPA matters.