Group of Disruption to the way Wi-Fi was designed and used in the process of disclosing almost everything Wi-Fi-enabled device rebellion in other ways. Most of these errors have occurred since the first Wi-Fi standard was introduced in 1997.
Findings, publicly revealed this week by researcher at New York University of Abu Dhabi Mathy Vanhoef, shows that an intruder within a Wi-Fi network could deal with information from the victim and tamper with their devices. But while its size and sudden appearance are staggering, most threats are hard to deal with, and not all Wi-Fi devices are affected by all of these errors.
Vanhoef collectively dubbed the findings a “Frag Attack,” simply “separation and attack,” because the errors are more closely related to other Wi-Fi hotspots and changes the speed of notification, and then puts these data back together at the other end.
Vanhoef says, “The app is used to optimize the functionality of the Wi-Fi network if there is a background noise.” The goal is to share data into reliable fragments that can be disseminated that can be re-integrated when received. But Vanhoef found a security breach during this time. “You can get the recipient to collect two pieces that are in different packages or even store the bad stuff and combine it with valid information,” he says. “For good reason these can be used to investigate more.”
Vanhoef also found a risk that could allow the fighter to enter incorrect data and become the “person in the middle” of the network, reading the pass to find out more or to monitor other connected devices that have some problems. They do not need a special opportunity to solve this problem.
“These manufacturing errors are significant. Because it’s so common, all the Wi-Fi devices I tried were at risk, ”says Vanhoef. “On the other hand, it’s hard to take advantage of them. Sometimes I like to say ‘before the patches hit.’ ”
Vanhoef has spent nine months working as a liaison with several online security agencies and companies around the world. Microsoft, Samsung, Cisco, Intel, Linksys, Netgear, Eero, and many more have already released patches. There are complete list of security advisers and Vanhoef says more preparations will be submitted in the next few weeks.
Standards for organizations and cybersecurity groups, including the Wi-Fi Alliance and the Industry Consortium for Internet Security Development, was released counselors this week to encourage all Wi-Fi users and network operators to change their devices if patches are available and available.
Almost all Wi-Fi devices need some sort of configuration or switch, especially routers and other network devices, which can be connected to support threats. But these are the kinds of tools, for consumers and businesses, which often does not receive changes, or simply cannot because of the anxiety of regression.
“These findings touch the heart of Wi-Fi’s performance,” says Jim Palmer, a longtime independent researcher. analysis the discovery of Frag Attack. “Some of these investigations are useless, but the attacks are also very difficult to carry out, not a crime. And the victims must be on Wi-Fi – as if they were exploding.”
Palmer says for Wi-Fi professionals, the Frag Attack will include a long list of problems and errors that need special consideration in the actual setting. In recent years, Vanhoef has also discovered another major Wi-Fi hotspot that reaches that level: the so-called Wi-Fi hotspot COME BACK and The dragon. As it is their findings, Palmer expects Frag’s visibility to be round and hidden on the armor for years to come.