<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Preventing How to Crack a Wi-Fi Network’s WPA Password with Re in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833035#M143631</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Follow the "rules": &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Mix upper and lower case; &lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Use numbers; &lt;/P&gt;&lt;P&gt;3.&amp;nbsp; Use common sense:&amp;nbsp; Passwords like "love", "password", "admin", etc is the first few words to be tried by crackers.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Jan 2012 21:11:40 GMT</pubDate>
    <dc:creator>Leo Laohoo</dc:creator>
    <dc:date>2012-01-11T21:11:40Z</dc:date>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Reaver</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833031#M143627</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are Cisco AP's vulnerable?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://lifehacker.com/5873407/how-to-crack-a-wi+fi-networks-wpa-password-with-reaver" target="_blank"&gt;http://lifehacker.com/5873407/how-to-crack-a-wi+fi-networks-wpa-password-with-reaver&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is their a new IOS available to handle this?&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:21:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833031#M143627</guid>
      <dc:creator>slwdaw_2</dc:creator>
      <dc:date>2021-07-04T04:21:41Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833032#M143628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you mean a dictionary attack to crack your password, then yes.&amp;nbsp; EVERY manufacturer is vulnerable.&amp;nbsp; If you practice good choice of passwords, then it will take time for Reaver to punch through. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 20:51:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833032#M143628</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2012-01-11T20:51:09Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833033#M143629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;WPA and WPA2 "PSK" are susceptible to this issue. If an attacker captures the 1 and 2 or the 2 and 3 part of the 4 way handshake they can then use tools like COWPATTY or REAVER to crack against a dictionary. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is important, dont use a KEY that will likely be in a dictionary. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 21:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833033#M143629</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-01-11T21:04:37Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833034#M143630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;What is important, dont use a KEY that will likely be in a dictionary.&lt;/PRE&gt;&lt;P&gt;So I can't use passwords like "password" or "youcantcrackthis" can I?&amp;nbsp; &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 21:09:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833034#M143630</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2012-01-11T21:09:45Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833035#M143631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Follow the "rules": &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Mix upper and lower case; &lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Use numbers; &lt;/P&gt;&lt;P&gt;3.&amp;nbsp; Use common sense:&amp;nbsp; Passwords like "love", "password", "admin", etc is the first few words to be tried by crackers.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 21:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833035#M143631</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2012-01-11T21:11:40Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833036#M143632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;BTW -- That&amp;nbsp; program only cracks WPS, not WPA. WPS is used on home router wifi units. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here listen to this blog video&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://nostringsattachedshow.com/2012/01/08/e02-wi-fi-protected-setup-battered-or-broken/"&gt;http://nostringsattachedshow.com/2012/01/08/e02-wi-fi-protected-setup-battered-or-broken/&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 21:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833036#M143632</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-01-11T21:12:09Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833037#M143633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Love, really ? Who uses "LOVE" ... Only Leo ... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 21:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833037#M143633</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-01-11T21:12:43Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833038#M143634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ha ha ha &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 21:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833038#M143634</guid>
      <dc:creator>Surendra BG</dc:creator>
      <dc:date>2012-01-11T21:20:30Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing How to Crack a Wi-Fi Network’s WPA Password wit</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833039#M143635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Too funny:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott Fella&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from my iPhone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 21:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833039#M143635</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-01-11T21:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing How to Crack a Wi-Fi Network’s WPA Password wit</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833040#M143636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leo must have been watching Hackers again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To piggy back on George:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco AP's do not use WPS, so they should not be vulnerable to this type of attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Linksys side of the house however, can/does use WPS.&amp;nbsp; you might want to hit the SMB forums and ask if they are aware of, and have a way to mitigate such attackes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jan 2012 23:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833040#M143636</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2012-01-11T23:47:39Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833041#M143637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;Leo must have been watching Hackers again!&lt;/PRE&gt;&lt;P&gt;LOL!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 00:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833041#M143637</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2012-01-12T00:15:01Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833042#M143638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are partly right here George. Granted, Reaver 'only' cracks WPS PINs, but once it has done so you are 'given' the WPA/WPA2 PSK. In a round about way you are ultimately getting your goal, the WPA/WPA2 PSK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A Reaver attack tutorial/demonstration using the OG150 is now available to download for free! WPA2 PSK WAS CRACKED IN 4 SECONDS!! Download the PDF tutorial from &lt;A href="http://www.og150.com/tutorials.php"&gt;http://www.og150.com/tutorials.php&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attack was demonstrated on a Linksys WAG54G2 router with v1.00.10 software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 May 2013 11:50:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833042#M143638</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2013-05-17T11:50:33Z</dc:date>
    </item>
    <item>
      <title>Preventing How to Crack a Wi-Fi Network’s WPA Password with Re</title>
      <link>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833043#M143639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per your query i can suggest you the following solution-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes Ap's are vulnerable. You can use encryption, PSK,WPA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secure your SSID broadcast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mix characters and use numeric and alpha-numeric.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information you can refer to the link-&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.giac.org/paper/gsec/4094/securing-cisco-aironet-1200-access-point/106589"&gt;http://www.giac.org/paper/gsec/4094/securing-cisco-aironet-1200-access-point/106589&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this will help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 May 2013 21:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/preventing-how-to-crack-a-wi-fi-network-s-wpa-password-with/m-p/1833043#M143639</guid>
      <dc:creator>Abhishek Abhishek</dc:creator>
      <dc:date>2013-05-17T21:44:34Z</dc:date>
    </item>
  </channel>
</rss>

