Reply
Thread Tools
Texrat's Avatar
Posts: 11,700 | Thanked: 10,045 times | Joined on Jun 2006 @ North Texas, USA
#11
Originally Posted by luca View Post
It's not that you have to type them like a normal password, so I don't see the problem.
I didn't say I saw a problem, just expressing surprise.

Anyway, thanks to brontide for digging in and providing helpful info.
__________________
Nokia Developer Champion
Different <> Wrong | Listen - Judgment = Progress | People + Trust = Success
My personal site: http://texrat.net
 
Posts: 10 | Thanked: 0 times | Joined on Sep 2007
#12
I have the same problem
 
Posts: 3,841 | Thanked: 1,079 times | Joined on Nov 2006
#13
This is a WPA-only problem I take it? I use a 64-char code in one of my configured WEP settings.
__________________
N800/OS2007|N900/Maemo5
-- Metalayer-crawler delenda est.
-- Current state: Fed up with everything MeeGo.
 
Posts: 10 | Thanked: 0 times | Joined on Sep 2007
#14
I found something on wikipedia

Security in pre-shared key mode

Pre-shared key mode (PSK, also known as personal mode) is designed for home and small office networks that don't require the complexity of an 802.1X authentication server. Each user must enter a passphrase to access the network. The passphrase may be from 8 to 63 printable ASCII characters or 64 hexadecimal digits (256 bits).[2] If you choose to use the ASCII characters, a hash function reduces it from 504 bits (63 characters * 8 bits/character) to 256 bits (using also the SSID). The passphrase may be stored on the user's computer at their discretion under most operating systems to avoid re-entry. The passphrase must remain stored in the Wi-Fi access point.

http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
 
Benson's Avatar
Posts: 4,930 | Thanked: 2,272 times | Joined on Oct 2007
#15
So... the solution is to brute-force reverse it to some <=63 char string which hashes to the hex string they gave you, and enter that...

It shouldn't be to hard to whip something up with gxmessage and gconftool, but I don't have a WPA net to try it on, so someone else do it.
 
Posts: 3,841 | Thanked: 1,079 times | Joined on Nov 2006
#16
I vaguely remember an earlier thread about hex vs. ascii. In one of the final postings there was a link to a website (possibly made by one of the posters) which would convert from ascii to hex. And possibly more. sorry I don't have a link to the thread, but searching should do it.
__________________
N800/OS2007|N900/Maemo5
-- Metalayer-crawler delenda est.
-- Current state: Fed up with everything MeeGo.
 
brontide's Avatar
Posts: 868 | Thanked: 474 times | Joined on Oct 2007 @ Capital District, NY, USA
#17
Originally Posted by TA-t3 View Post
I vaguely remember an earlier thread about hex vs. ascii. In one of the final postings there was a link to a website (possibly made by one of the posters) which would convert from ascii to hex. And possibly more. sorry I don't have a link to the thread, but searching should do it.
Maybe that would work for WEP, but WPA-PSK uses a secure one way hash function. It should be impossible ( for non NSA folks ) to brute force the SHA1 hash used.
 

The Following User Says Thank You to brontide For This Useful Post:
Benson's Avatar
Posts: 4,930 | Thanked: 2,272 times | Joined on Oct 2007
#18
Hah! people besides the NSA have botnets; it's just not economically sane for them to try cracking a single WAP.
 
luca's Avatar
Posts: 1,137 | Thanked: 402 times | Joined on Sep 2007 @ Catalunya
#19
Originally Posted by brontide View Post
Maybe that would work for WEP, but WPA-PSK uses a secure one way hash function. It should be impossible ( for non NSA folks ) to brute force the SHA1 hash used.
unless you're using a passphrase that can be broken with a dictionary attack, hence the recommendation to use a very long (possibly the maximum allowed, i.e. 63 chars) passphrase made up of random characters.
 
brontide's Avatar
Posts: 868 | Thanked: 474 times | Joined on Oct 2007 @ Capital District, NY, USA
#20
Originally Posted by luca View Post
unless you're using a passphrase that can be broken with a dictionary attack
http://www.renderlab.net/projects/WPA-tables/
 

The Following User Says Thank You to brontide For This Useful Post:
Reply


 
Forum Jump


All times are GMT. The time now is 15:53.