-
Notifications
You must be signed in to change notification settings - Fork 169
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for Easybox #14
Comments
Do you know a place where is the vulnerability is actually published? From what I understood, there is a new one which is a variation on the old redfave [email protected] escreveu no dia Sat Dec 06 2014 at
|
Yes, you understood right, it is only a variation of the previous method wich was patched by Vodofone. The new one is still unpatched. In order to gain security the router owner has to change the WPA password and the WPS PIN. If one of these is the standard value, he is still vulnerable. But unfortunately I'm also unable to find a working code or description of the algorithm. In the article there is something mentioned about a Proof-of-Concept tool by Vodafone, but I can't find it. |
If you do find it, write I have the one for the WPS. |
As far as I understand, I found the guy who programmed an Android-App which can calculate the WPA-Keys. He seems to have a lot experience with Wifi-Cracking on the Android platform. Have a nice day |
Hi
there is a new vulnerability in German Easybox routers from Vodafone, which makes it possible again to get the standard WPA password or WPS-PIN. Maybe you can implement the new algorithm: http://www.heise.de/newsticker/meldung/Akute-Sicherheitsluecke-in-Vodafone-Routern-ist-wieder-offen-2294798.html
The text was updated successfully, but these errors were encountered: