Is Your Office WiFi Security Vulnerable to Hacking? How?
A recent article in Ars Technica rekindled a healthy nerve with many professionals and business owners regarding general password and office WiFi security…
Passwords are the keys that secure virtually everything nowadays. Use a weak password and the outcome could be disastrous. And one of the areas where passwords are the weakest are the standard issue office and home WiFi networks now universally ubiquitous.
Earlier this month Cloud9 execs attended the ABA Tech conference and one of the more provocative presentations was that of John Simek, VP at Sensei Enterprises, who demonstrated the relative ease of cracking most office WiFi security using a $99 device called the Pineapple Mark IV to identify local WiFi networks and their weaknesses.
As reported in ABA Journal, Simek noted that, using the device at home, he was able to track Internet activities of his neighbor who works for a security firm hired by the federal government. The Pineapple (available from HakShop) is ostensibly being marketed for “penetration testing” on office WiFi security (no questions asked).
“In theory, these protections prevent hackers and other unauthorized people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords. I was curious how easy it would be to crack these passcodes using the advanced hardware menus and techniques that have become readily available over the past five years. What I found wasn’t encouraging,” writes Dan Goodin at Ars Technica.
The Good News About Office WiFi Security
The good news is that WPA and WPA2 use very intense password-storage protocol that greatly reduces the speed of automated cracking programs. By using the PBKDF2 key derivation function along with 4,096 iterations of the SHA1 cryptographic hashing algorithm, attacks that took minutes to run against the recent LinkedIn and eHarmony password dumps of last year would require weeks or even months to complete against such WiFi encryption scheme.
Further, WPA and WPA2 passwords require a minimum of 8 characters, removing the possibility that users will choose shorter passphrases that could be brute-forced in reasonably short timeframes. WPA and WPA2 also use a network’s SSID, preventing garden-variety hackers from using pre-computed tables to crack the coding.
The Bad News About Office WiFi Security
The bad news is that office WiFi security password cracks can still be accomplished with relative ease on many if not most home, small business and professional practice networks.
The first step is to capture the “four-way handshake,” a cryptographic process a device uses to validate itself to a wireless access point and vice versa. This handshake takes place behind a cryptographic veil that simply cannot be pierced. But there’s nothing stopping a hacker from capturing the packets that are transmitted during the process and then seeing if a given password will complete the transaction.
To capture the working handshake, a hacker’s target network, once identified by the Pineapple, must be monitored while an authorized device is validating itself to the network node.
This requirement may sound daunting, considering that many of our office devices stay connected to the office (or home) WiFi around the clock. But that’s easy to get around, Goodin points out, by sending out a ‘deauthorization signal packet’ – devices that encounter the deauthorization signal will promptly drop and then rejoin the network, and that’s when the handshake is captured. The deauthorization packet can be generated by a device like ‘Silica,’ a wireless risk assessment tool sold by Immunity.
After the handshake is acquired a cyber sneak can then upload the resultant datafile to CloudCracker, an SaaS website that charges $17 to check the raw handshake for a WiFi password against 600+ million possible passwords. If even more semantic firepower is needed, for an extra $34 there is an additional 1.2 billion password enhancement.
“With less than two hours practice, I was able to do just that and crack the dummy passwords “secretpassword” and “tobeornottobe” I had chosen to protect my test-target networks,” adds Goodin.
And what typically gets taken when a professional practice gets their network hacked? According to a report from a law practice that received FBI notice of breach, “They had all of our client files.”
An Immediate Solution for Super Increased Office WiFi Security
So, what to do? Use stronger passwords, of course. Besides changing your WiFi password every few months or so and NOT using ANY 10-digit phone numbers, WPA allows for passwords with up to 63 characters.
One easy secure approach is to string together five or six randomly chosen words, like “orangecrackerpickleeaterpushover” (32 characters)* – simple enough to remember and repeat but very hard to crack, even for the 1.8 billion word CloudCracker.
*(27 to the 32nd power or 6 followed by 51 zeros)
So, ‘get cracking’ yourself and shore up your WiFi achilles heel now, before its too late!
Remember us, Cloud9 Real Time was chosen by more accountants polled as best cloud platform for the accounting industry. In 2012 Cloud9 won more industry awards than all of its competitors combined. Get a demo or take a 7 day test drive and find out what all the excitement is about!
D. Marcus Keith is a partner in ADMAX, a local and national; “Internet Marketing Optimization” agency that has been performing SEO-related services for Cloud9 Real Time since 2009.