this post was submitted on 09 Jan 2025
18 points (90.9% liked)
Pulse of Truth
1560 readers
80 users here now
Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).
This community is automagically fed by an instance of Dittybopper.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Does anyone have more information than what is included in the article?
This sounds like a basic DOS attack initiated by poisoning the information the router uses to split resources/bandwidth/communication time between multiple users. The important piece will be if it requires an attacker to be authenticated with the AP to pull off.
~~As far as I'm aware, modern WPA2 encryption is still secure against brute force and replay attacks unless you're using WPS Pins for authentication (and I haven't seen a device with that in ages). So~~ this appears to be just another case of "keep untrusted devices off your WLAN".
Edit: I am SUPER out of date with my wifi security knowledge.
I was cracking wpa2 aes networks over a decade ago, they are not secure to brute force and replay attacks lol you'd need PMF forced on to prevent replay attacks but this breaks compatibility with half the shit on the market
Security is only as strong as the password, where modern hardware can achieve hashrates that quickly break all but complex phrases
Guess I'm more out of date on my wifi security knowledge than I thought. Sheesh. Got some reading to do.