![]() When a device connects to a hotspot, a handshake takes place in which the client and the hotspot negotiate their connection. However, the short list of known passwords being used in iOS means that these default passwords are extremely susceptible to brute force attacks. The Personal Hotspot feature employs WPA2-PSK encryption, which is generally regarded as secure for WiFi. The researchers state that all of these factors make it possible to compromise a hotspot connection in less than 50 seconds. This knowledge can potentially speed up the process of cracking the password by trying the most commonly chosen words first. It was also discovered that words from the list aren't chosen randomly, and some words are chosen much more frequently than others. This combination only leaves the possibility of about 18.5 million different passwords, a relatively low number when it comes to password cracking, making it an easy target for a brute force attack. iOS generates these passwords with one of the words from the list, followed by a four-digit number. Freiling found that iOS chooses from only 1,842 words in a wordlist, each 4 to 6 characters in length, when generating these default passwords. Under Settings on iOS, inside Personal Hotspot, you will normally find Wi-Fi Password to be pre-populated with a memorable password followed by four digits. The more complex a password, the more computing power and/or time it takes to try the combinations. A brute force attack is one that systematically tries all possible combinations of a password until the correct one is found.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |