Wifi Networks Vulnerable After Security Flaw Found in WPA2 Protocol

Lee Rogers
Daily Stormer
October 17, 2017

A vulnerability has been found in the security protocol used by most wifi networks around the globe.

We here at the Daily Stormer have a staff of the most versatile writers anywhere on the planet. I’m not just saying this for egotistical purposes, I’m saying it because it is 100 percent true. Mainstream sites usually hire one-dimensional writers who are placed in silos. More often than not, they are only allowed to comment on very specific topics. Our combined life experiences give us the ability to coherently comment on a wide range of issues ranging from politics, men’s health, filthy skank whores and even technology.

With that said, this particular article focuses on some new happenings in the world of information security. This has been a fairly big news item discussed on tech blogs in the past day or so. It revolves around a security flaw found in WPA2 (Wifi Protected Access 2). For those of you not familiar with WPA2, it is a security protocol used by the vast majority of wifi networks in use today. If you connect to any sort of public wifi network, there is a very good chance it uses WPA2.

The security flaw theoretically allows an attacker to exploit a vulnerability in the four-way handshake of the protocol. This is the function of WPA2 which allows devices with the appropriate pre-shared key to join the network. Clients attempting to associate with a legitimate network can be forced on to an illegitimate wireless device by fooling the client into using a fake encryption key over and over again. The exploit basically allows a bad guy to do a man in the middle attack on clients.

The one thing to note about hacking wifi networks is that they can only be exploited if the attacker is physically within range of the network. For the average person who runs a wireless router at home, the chances are low that someone would risk hacking such a network with this exploit. They’d have to find a way to physically install and power on their own device within range of the wireless router. This would typically represent a number of logistical challenges for an attacker.

Only Jonny Lee Miller, Angelina Jolie and the rest of this elite crew would have the guts to hack your wifi using this technique!

When weev found out that I was penning a piece on this subject, he pointed me to some supporting comments he already made about this on the Daily Stormer BBS.

Anybody that has the ability to deploy themselves to your physical location with radio gear to accomplish this does not need this exploit to compromise you, they can likely just break into your house while you’re out unless you live in a bank vault you made yourself.

Should you install the firmware updates on your router for this? Yes, absolutely. But I wouldn’t worry about it. This isn’t really very practical today. Nobody is going to put radio gear next to your house to what, steal your credit card? Cost of exploitation exceeds cost of reward.

It’s worth noting that vendors are already working on patches for the security flaw. Some have already released patches for it.

The big takeaway from this is that you should definitely patch your gear. It is just unlikely that an attacker would go through the trouble to hack your home wifi network using this vulnerability. It is more likely that businesses or organizations with significant assets would be targeted but that’s still a risky proposition for an attacker. The requirement of being physically close to the target represents a major deterrent.

While this is a significant story in the sense that WPA2 is such a widely used security protocol, the story has been sensationalized a bit. WPA2 is not going away. Vendors will develop security patches and it will be up to administrators to install them.