Unconfigured Ad Widget

Collapse

Secure your WiFi

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • #46
    FatCity67
    Calguns Addict
    • Jan 2011
    • 6062

    Things are going to get fun when quantum computing goes mainstream.
    Originally posted by Nodaedul
    So in summary USE A STRONG PASSWORD and you are good to go on WPA2.

    Strong passwords can only be brute forced. This is done as people stated earlier by sniffing your handshake with the router. They only get the hash of your password though. The hash is what your password turns into after it is cranked through WPA2's AES-256 encryption. The only way the attacker can then get your real password is by running guess passwords through AES-256 until one of their guesses spits out a matching hash. To try all of the possible guesses would take a mass of supercomputers longer than the age of the universe to do.

    SO, the attacker hopes you used a stupid password made up of dictionary words with little or no numbers or symbols. There are websites online that will take the stolen hash and compare it to their massive pre-calculated tables of billions of simple dictionary word based password/hash combos and return the correct password.

    But again. Using a strong password kills the dictionary attack and leaves only the trillion year process of brute force. Unless of course mathmaticians can someday solve the P=NP problem and find linear time solutions for these exponential time problems, but that is unlikely.
    LetsGoBrandon
    FJB

    "From Hell's heart, I stab at thee; For hate's sake, I spit my last breath at thee." -Khan

    "There is no reason to be alive if you can't do deadlift."-J.P.S.

    Comment

    • #47
      the86d
      Calguns Addict
      • Jul 2011
      • 9587

      Chart seems legit?:
      Learn if is WPA2 secure enough. What to do to protect your Wi-Fi network password and how complex it is to crack WPA security.

      Comment

      Working...
      UA-8071174-1