Brute Force WPS Using Reaver

A major vulnerability was found in WPS and routers using WPS.  This vulnerability can lead to you being able to break the WPS and ultimately the WPA/WPA2 encryption on the router.  Some important details in regard to this is even if the router has WPS disabled that it can still be circumvented.

This brute force attack is available via an code.google.com open source project called Reaver.  This project is only supported on the Linux platform but is fairly straightforward for compiling.  Just give it the interface to connect on and the BSSID of the target wireless network.   I found I could get the  BSSID via kismet easily enough.

Some devices they tested had a blocking mechanism to prevent brute force attacks. Below is a table in the PDF dealing with vendors and vulnerabilities.

Vendor Device Name HW-Version FW-Version Lock down WPS-certified
D-Link DIR-655 A4 (Web Interface)
A5 (Label)
1.35 No Yes
Linksys WRT320 1.0 1.0.04 ?6 Yes
Netgear WGR614v10 ? 1.0.2.26 Yes Yes
TP-Link TL-WR1043ND 1.8 V1_110429 No No

Firmware versions are up-to-date as of 18.10.2011.

Introduce sufficiently long lock-down periods in order to make an attack impractical. Of course this requires a new firmware release.

Attempts before lock down Lock down time Attempts per minute Maximum attack time Maximum attack time Comment
11000 0 minutes 46.15 3.97 hours 0.17 days no lock down
?7 4.20 43,65 hours 1,82 days Netgear WGR614v10
3 1 minutes 2.82 65.08 hours 2.71 days Requirement for WSC 2.0 certification?8
15 60 minutes 0.25 737.31 hours 30.72 days Lock down configurations making brute force less practical
10 60 minutes 0.17 1103.97 hours 46.00 days
5 60 minutes 0.08 2203.97 hours 91.83 days

Assumed time per attempt: 1.3 seconds

?6 – WPS-functionality always stopped to work somewhere between 2 and 150 failed authentication attempts. The functionality did not even return after several hours. I would consider this a bug in the firmware which causes a DoS rather than lock-down functionality.
?7 –  No consistent lock down pattern was found. However on average about 4.20 authentication attempts per minute were possible.
?8 –  http://www.wi-fi.org/files/20110421_China_Symposia_full_merge.pdf

Posted January 12, 2012 by Jason B. in Computing, Linux, Security