On Monday 31 August 2009 01:04:57 Celejar wrote: > On Wed, 5 Aug 2009 12:27:24 -0500 > "Boyd Stephen Smith Jr." <b...@iguanasuicide.net> wrote: > > If the wireless network uses WPA, you might be safe. There are some > > fairly sophisticated attacks against WPA personal, that don't require > > much resources besides time. So, treat those networks has if they have > > no security. However, WPA enterprise and WPA2 are still secure at this > > point in time; you can trust that an attacker can't see your packets > > between your radio and the AP's radio. > > Are you referring to this, or something else: > > http://hardware.slashdot.org/story/09/08/27/180249/WPA-Encryption-Cracked-I >n-60-Seconds
Actually, I think I was referring to the earlier 12 to 15 minute attack, although I didn't get either from slashdot. In any case, it would appear that I was mis-remembering the severity of the attack. Breaking the TKIP would let the attacker on the network, but it wouldn't necessarily let them sniff your packets. -- Boyd Stephen Smith Jr. ,= ,-_-. =. b...@iguanasuicide.net ((_/)o o(\_)) ICQ: 514984 YM/AIM: DaTwinkDaddy `-'(. .)`-' http://iguanasuicide.net/ \_/
signature.asc
Description: This is a digitally signed message part.