cancel
Showing results for 
Search instead for 
Did you mean: 

WPA2 Password Cracking in under 10 hours - WPS Side-channel attack

spraxyt
Resting Legend
Posts: 10,063
Thanks: 671
Fixes: 75
Registered: ‎06-04-2007

Re: WPA2 Password Cracking in under 10 hours - WPS Side-channel attack

Yes it is. Technicolor own the Thomson Telecom brand.
David
MartinGoose
Grafter
Posts: 36
Thanks: 4
Registered: ‎08-10-2010

Re: WPA2 Password Cracking in under 10 hours - WPS Side-channel attack

Quote from: Kelly
We ship all our technicolor routers with WPS off.

Does this survive a factory reset?
Product Name: TG585 v8
Software Release: 8.2.7.8
If not what is the WPS facility called and on which router management screen does it appear?
mattturner
Grafter
Posts: 246
Thanks: 2
Registered: ‎25-06-2009

Re: WPA2 Password Cracking in under 10 hours - WPS Side-channel attack

Hi Martin,
Yes, this does survive a factory reset. There is no web interface to enable WPS, you'll need to do this through the telnet interface. If you're interested then the command is:
:wireless wps config ssid_id=0 state=enabled
And if you change your mind, to disable then run this:
:wireless wps config ssid_id=0 state=disabled
dick:quote
MartinGoose
Grafter
Posts: 36
Thanks: 4
Registered: ‎08-10-2010

Re: WPA2 Password Cracking in under 10 hours - WPS Side-channel attack

Quote from: Matt
Yes, this does survive a factory reset.

Good news!
Quote
There is no web interface to enable WPS, you'll need to do this through the telnet interface.

OK.. 2 questions.
1. Is there a Telnet command to query the current status?
2. Any other usefulTelnet commands that are not available in the web interface?
PS The part of the web interface that confused me was on the Wireless config page.
The item is called "Allow New Devices:".
The options are "New stations not allowed", "New stations are allowed (via registration)", or "New stations are allowed (automatically)"
I wondered if this was WPS.
spraxyt
Resting Legend
Posts: 10,063
Thanks: 671
Fixes: 75
Registered: ‎06-04-2007

Re: WPA2 Password Cracking in under 10 hours - WPS Side-channel attack

If you telnet into the router and do
wireless wps config
(without the state= parameter) it will tell you the current state (eg WPS disabled)
After enabling it I think you need to do
saveall
to ensure the changed setting survives reboot.
David
VileReynard
Hero
Posts: 12,616
Thanks: 579
Fixes: 20
Registered: ‎01-09-2007

Re: WPA2 Password Cracking in under 10 hours - WPS Side-channel attack

Do you know anyone who wants to sit outside your house for 10 hours, so they can intercept your valuable traffic?
Excess of paranoia...

"In The Beginning Was The Word, And The Word Was Aardvark."

MartinGoose
Grafter
Posts: 36
Thanks: 4
Registered: ‎08-10-2010

Re: WPA2 Password Cracking in under 10 hours - WPS Side-channel attack

Quote from: A
Do you know anyone who wants to sit outside your house for 10 hours, so they can intercept your valuable traffic?

No, but I guess if anyone did want to I would not know them.
Quote
Excess of paranoia...

No, excess of curiosity about how things work.