Results 1 to 10 of 10

Your favorite Apple, iPhone, iPad, iOS, Jailbreak, and Cydia site.


Thread: Researchers Find Huge Security Flaw with Hotspot Feature in iOS Platform

  1. #1
    MMi Staff Writer Akshay Masand's Avatar
    Join Date
    Sep 2011
    Location
    New York City
    Posts
    4,367
    Thanks
    3
    Thanked 144 Times in 129 Posts

    Default Researchers Find Huge Security Flaw with Hotspot Feature in iOS Platform


    According to a group of German researchers who are claiming to be able to crack iOS Personal Hotspot keys in less than a minute, the default generated passwords that are currently protecting the mobile hotspot feature of Apple’s iPhones and iPads are weak and flawed. In a paper titled “Usability vs. Security: The Everlasting trade-Off in the Context of Apple iOS Mobile Hotspots,” researchers from the University of Erlangen demonstrate that iOS generates weak default passwords for its mobile hotspot feature and showed that the code was susceptible to brute force attacks on the WPA2 handshake.

    The paper continues by sharing that iOS generates its default passwords based on a word list of roughly 52,500 entries, though iOS apparently relies on about 1,842 of those entries. Additionally, the process for selecting words from the list is insufficiently randomized. This leads to skewed distribution of words that go into default passwords and the skewed distribution apparently makes it easier to crack a device’s password.

    Using a GPU cluster with four AMD Radeon HD 7970s, the researchers claimed a 100% success rate in cracking iOS-generated passwords. Over the course of the experiment, the researchers got the time to retrieve a password down to around 50 seconds. The paper noted that “access to a mobile hotspot also results in access to services running on a device.” It points to apps such as AirDrive HD and other wireless sharing apps as the first easily accessible services once access to the device has been gained.

    Aside from access to certain apps on the device, the paper also notes that computers and other smart devices connected to the hotspot could also be affected. Additionally, an attacker might be able to intercept messages passing between connected devices and the mobile hotspot. The researchers write that the entire process of identifying targets, de-authenticating wireless clients, capturing WPA handshakes, and cracking hotspot default passwords could easily be automated. The team even built an app called Hotspot Cracker in order to automate the word list generation process. The computing power necessary to brute force crack the password, they say, could be supplied by cloud computing services.

    According to the paper, the tendency for device manufacturers to make their default hotspot passwords easily memorizable is the main cause of the vulnerability. The researchers call for truly randomized passwords to be the default setting for mobile hotspot-capable devices. The report concludes the following:

    In the context of mobile hotspots, there is no need to create easily memorizable passwords. After a device has been paired with once by typing out the displayed hotspot password, the entered credentials are usually cached within the associating device, and are reused within subsequent connections.
    One last thing to point out was that both Windows Phone 8 and Android devices are also vulnerable to similar attacks. Android by default generates tougher passwords but many vendors modify the system for their own devices and change the password settings. Windows Phone 8 passwords consist of only eight-digit numbers, giving hackers a search space of 10^8 candidates.

    Source: University of Erlangen (PDF)

    Twitter: @AkshayMasand

  2. The Following User Says Thank You to Akshay Masand For This Useful Post:

    A11AST3R (06-20-2013)

  3. #2
    Why is there a spelling mistake in the title?

  4. #3
    Quote Originally Posted by Spliff1 View Post
    Why is there a spelling mistake in the title?
    Grammar nazi's were sleeping.

  5. #4
    Livin the iPhone Life bigboyz's Avatar
    Join Date
    Feb 2009
    Location
    North East Coast
    Posts
    1,744
    Thanks
    2
    Thanked 266 Times in 172 Posts

    Here is a novel idea, create your own long password using symbols, caps and numbers. Yes, fix the spelling haha!

  6. #5
    Who uses default passwords anyway ?
    Non-news article for newbophytes.

  7. #6
    My password is 9999999999. I rarely use it for more than 30 minutes at a time, and it's usually while waiting in a doctor's office or as a car passenger. For me, I don't care if there is a security flaw.

  8. #7
    Is Wifi-cracking a large-scale means of infection and data-acquisition ?

  9. #8
    iPhone? More like MyPhone rkisling's Avatar
    Join Date
    Aug 2007
    Location
    San Franicisco
    Posts
    180
    Thanks
    33
    Thanked 5 Times in 5 Posts

    The title is misspelled because it's harder to crach passwords that are mispellled words...

  10. #9
    Quote Originally Posted by iPhoneThereforeIAm View Post
    Who uses default passwords anyway ?
    Non-news article for newbophytes.
    THANK YOU!

    I have been saying this all along!

  11. #10
    Oh because we won't see (1more connection) in big blue letters on the status bar.

Posting Permissions
  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •