Messages - TucknDar [ switch to compact view ]

Pages: prev1 2 3 4 [5] 6 7 8 9 10 ... 221next
21
Living Room / KRACK - WPA2 Vulnerability Exposed
« on: October 16, 2017, 01:45 PM »
This subject is beyond me, but I was a little surprised to see that there wasn't a thread on this already...

Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a client is visiting.

Some more on this:

https://www.krackattacks.com/

In layman's terms, to an end user, what are the potential harm that can be done, according to the wise world of DC'ers?

Edit: To answer this myself, straight from the source:

We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted.   This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.

The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected. During our initial research, we discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks. For more information about specific products, consult the database of CERT/CC, or contact your vendor.

The research behind the attack will be presented at the Computer and Communications Security (CCS) conference, and at the Black Hat Europe conference. Our detailed research paper can already be downloaded.

22
Do you use ATS currently? Impressions? Looks interesting, although I'm unsure if I actually need the extra features compared to Windows Task Scheduler...

23
Living Room / Re: USB HDD enclosure or what?
« on: October 10, 2017, 11:53 AM »
Worked like a charm! And to my surprise the drive still works. I backed it up and can take a nostalgic look at my 2004 computer. Apparently I had gathered quite the collection of digital mess already...

Thanks again!

Now it's time to dig up a few other lost drives...

24
Living Room / Re: USB HDD enclosure or what?
« on: October 08, 2017, 01:38 PM »
I took another look at the drive, and it's IDE, so looks like I need a dock with that capability. Sharkoon does seem like the way to go. Now I just hope the drive isn't completely dead... Come to think of it, I've got an old WD MyBook that doesn't start, so I might be able to get the drive out from that as well.

Thanks for the suggestions, I knew I could count on the good old DonationCoder forum!

edit: I ordered the Sharkoon DriveLink Combo USB 3.0 - https://www.sharkoon.com/product/1686/13760 Not as elegant as the dock solutions, but this was cheaper and it's something that'll probably stay in a drawer and be called upon only when needed.

25
Living Room / Re: USB HDD enclosure or what?
« on: October 08, 2017, 11:53 AM »
Excellent, thanks! Exactly what I need.

Pages: prev1 2 3 4 [5] 6 7 8 9 10 ... 221next
Go to full version