Last week we published that it had been discovered a vulnerability in the WPS of routers, East Wi-Fi Protect Setup, which serves to connect safely and above all easily either by pressing a button on the router, entering a PIN or by adding a computer from the router menu, you have been seriously compromised in the PIN entry part.
Two methods of cracking this “security” device have already come out.
Here are the links for the download, at the moment it is only for Linux operating systems.
According to the blog of the person who discovered this vulnerability:
Update (12/29/2011 – 20:15 CET)
As you probably already know, this vulnerability was independently discovered by Craig Heffner (/ dev / ttyS0, Tactical Network Solutions) as well – I was just the one who reported the vulnerability and released information about it first. Craig and his team have now released their tool “Reaver” over at Google code.
My PoC Brute Force Tool can be found here. It’s a bit faster than Reaver, but will not work with all Wi-Fi adapters.
For those who do not speak English:
There are two tools, Reaver that works with many wireless adapters, and the author’s proof of concept that supports fewer cards but is twice as fast.
Download author’s proof of concept
Now we only need to check if our router is affected by this vulnerability or if it is otherwise immune.