back to article Snooker WPA secrets with this Wi-Fi tool

Crypto geek George Chatzisofroniou has published a WiFi social engineering tool used to steal credentials and credit cards from users of secure wireless networks. The administrator at the University of Greece developed the WiFiPhisher tool which sought out and then replicated WPA-protected networks, sans password. The tool, …

  1. Anonymous Coward
    Anonymous Coward

    "Bad guys and security testers "

    I may be getting confused in my old age, but the mention of 'security testers' seems just a fig leaf covering the fact that this tool is almost 100% for nefarious purposes. Perhaps the bloke should be having his collar felt.

    1. Cipher

      Re: "Bad guys and security testers "

      "PenTesters" is another one...

      A chap I know offers free shell accounts, potential new users are vetted on IRC. Tunneling is unvailable, but these types come in, request an account and ask about tunneling capability as they wish to do pen testing.

    2. Bob AMG

      Re: "Bad guys and security testers "

      As with all security attack tools it is designed to increase awareness of the issue. If he had simply sold it to the feds \ NASA \ other corrupt power hungry organisations then he would be doing the community a disservice. We can now educate our users.+1 for wifi pineapple and SSL strip and other man in the middle attacks.

      1. Anonymous Coward
        Anonymous Coward

        @Bob AMG - Re: "Bad guys and security testers "

        I'm all for increasing awareness, but publicly releasing a tool goes a bit beyond this.

        As you say, 'We can now educate our users'. But what about the vast majority of people who wouldn't even understand this topic and who don't have a helpful tech bod to guide them? They are now even more vulnerable.

        1. Anonymous Bullard

          Re: @Bob AMG - "Bad guys and security testers "

          No. They're not even more vulnerable - they're just as vulnerable as they've always been.

          These tools have always been available to "insiders", and can just as easily be created by anyone motivated enough.

          But why should only the "bad guys" have these tools? Why can't us white-hats use these same tools, to ensure our systems aren't vulnerable to them?

          If you're so concerned about non-technical people not understanding the problem and running insecure kit then you should bark at the vendors who they're throwing money at to make secure equipment and employ a decent (and long term) upgrade process.

          1. Anonymous Coward
            Anonymous Coward

            @ Anonymous Bullard - Re: @Bob AMG - "Bad guys and security testers "

            they're just as vulnerable as they've always been

            I don't know about that - the tool didn't exist until he created it and published it, thereby providing a new means for attacks to be launched.

            why should only the "bad guys" have these tools

            Good point, but it seems to me that creating and publishing the tool has just given a leg-up to a whole host of bad guys who would otherwise not have had the skill to create it. I don't think the benefit from good guys having it really makes up for that.

            On the last point about non-technical people running insecure kit - my understanding of this particular tool is that it attacks properly configured access points and then spoofs innocent people, regardless of the level of security of their kit.

      2. User McUser
        Alien

        Re: "Bad guys and security testers "

        If he had simply sold it to the feds \ NASA \ other corrupt power hungry organisations then he would be doing the community a disservice.

        Unless we're trying to hack the aliens' WiFi, it seems highly unlikely that the National Aeronautics and Space Administration would ever need something like this.

        And I'm sure the National Security Agency *already* knows your WPA PSK.

  2. petur
    FAIL

    And this is new?

    Please google 'wifi pineapple' before writing another such article...

  3. Anonymous Coward
    Anonymous Coward

    Nothing new

    <cough> wifi pineapple from hak5<cough/>

  4. bigtimehustler

    Isn't the far easier solution to actually password protect the 'new' access point and then log the password thats entered by the user? Them thinking it's their own access point, they will just re enter their real one. Why bother with the fake web page nonsense that makes it look very suspect.

    1. Anonymous Coward
      Anonymous Coward

      Because what you call a «password» is actually a «pre-shared key», and it is *not* sent to the access point, it has to be identical on both sides to work. So they bother because they actually know what they're dealing with.

      You're welcome.

  5. Anonymous Coward
    Anonymous Coward

    thoses pesky Greeks

    They'll do anything to get hold of cash to prop up their basket case economy!

  6. Daniel Hall
    Trollface

    Guess what I am doing when I get home..

  7. phuzz Silver badge
    Facepalm

    There is a big barrier to this working and that is that most users have no idea what their password is to login to the router. Indeed, most people wouldn't even that was a possibility ("What's my 'wifi router password'? Is that the same as my wifi password? I think I have that written down on a bit of paper somewhere...").

  8. Anonymous Coward
    Anonymous Coward

    Everyone calm down this type of attack has long long been going on, the only thing new this tool does is automates the part of grabbing a few details for the existing router, considering its generic approach your able to whip up something that looks more beliveable and hence more likely to actually fool someone in a very short time... This tool basically fills a void that doesnt exist, if someone falls for this they would just a be fooled by a generic script (enter wifi password page).

    Anyone intrested google "wifi pinapple" for something thats easy and small to deploy if you dont want sit around a target (test area cough) running kali with a laptop.

    MDK them all, all you whiffys belong to meeeeee.

  9. Henry Wertz 1 Gold badge

    Wouldn't work here!

    "I don't know about that - the tool didn't exist until he created it and published it, thereby providing a new means for attacks to be launched."

    Yes it did exist. Deauth attacks have been around for a long time, software to run rogue access points has been around for a long time, and of course software to sniff or mangle the traffic on said AP has also been around a long time. To me, the fact that you didn't know this even existed and now know it does indicates this has done it's job, making people aware of the potential problem.

    I don't think it'd work on my parents! If they got that page asking for the WPA password, my mom'd be like "Oh, hell, I put that password in like a year ago. I wrote it down on a note in the drawer somewhere, where'd that go.... oh, never mind, I'll just go do something else." 8-)

  10. JeffyPoooh
    Pint

    Target?

    Wouldn't (shouldn't) work at home. Not least because baddie needs to get close.

    For public WiFi, just ask the coffee-slinging barista for the password.

    So it's targeted against a narrow slice of WiFI: Private network with ill-informed users in a public space.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like