{"id":2915,"date":"2010-07-27T11:01:40","date_gmt":"2010-07-27T10:01:40","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=2915"},"modified":"2015-09-09T19:37:27","modified_gmt":"2015-09-09T11:37:27","slug":"wpa2-vulnerability-discovered-hole-196-a-flaw-in-gtk-group-temporal-key","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2010\/07\/wpa2-vulnerability-discovered-hole-196-a-flaw-in-gtk-group-temporal-key\/","title":{"rendered":"WPA2 Vulnerability Discovered – “Hole 196” – A Flaw In GTK (Group Temporal Key)"},"content":{"rendered":"

Well as it tends to be, when something is scrutinized for long enough and with enough depth flaws will be uncovered. This time the victim is WPA2<\/a> – the strongest protection for your Wi-fi network which is standardized.<\/p>\n

WEP fell long ago and there’s a myriad of WEP Cracking<\/a> tools available. In 2008 it was reported flaws had been found in WPA and it was partially cracked<\/a>.<\/p>\n

These factors of course shifted a lot of people to WPA2, which has now been found to have certain flaws.<\/p>\n

Perhaps it was only a matter of time. But wireless security researchers say they have uncovered a vulnerability in the WPA2 security protocol, which is the strongest form of Wi-Fi encryption and authentication currently standardized and available.<\/p>\n

Malicious insiders can exploit the vulnerability, named “Hole 196” by the researcher who discovered it at wireless security company AirTight Networks. The moniker refers to the page of the IEEE 802.11 Standard (Revision, 2007) on which the vulnerability is buried. Hole 196 lends itself to man-in-the-middle-style exploits, whereby an internal, authorized Wi-Fi user can decrypt, over the air, the private data of others, inject malicious traffic into the network and compromise other authorized devices using open source software, according to AirTight.<\/p>\n

The researcher who discovered Hole 196, Md Sohail Ahmad, AirTight technology manager, intends to demonstrate it at two conferences taking place in Las Vegas next week: Black Hat Arsenal and DEF CON 18. <\/p><\/blockquote>\n

It’s a pretty interesting attack and leverages a man-in-the-middle<\/a> style exploit to decrypt data from the wire and inject malicious packets onto the network.<\/p>\n

The researched Md Sohail Ahmad is going to demo the exploit at 2 upcoming conferences (Black Hat and DEF CON 18) so I’ll be looking out for the slides and videos on that. We’ll have to wait and see if this is another ‘mostly theoretical<\/em>‘ attack – or something that can actually be implemented in the wild.<\/p>\n