Re: [Full-disclosure] Linksys Routers still Vulnerable to Wps vulnerability.

2012-02-12 Thread farthvader
_
Use Tomato-USB OS on them.
_

Besides you void warranty...
list of DD-WRT Supported routers:

 E1000supported
 E1000 v2 supported
 E1000 v2.1   supported
 E1200 v1 ???
 E1200 v2 ???
 E1500???
 E1550???
 E2000supported
 E2100L   supported
 E2500not supported
 E3000supported
 E3200supported
 E4200 v1 not supported yet
 E4200 v2 not supported
 M10    
 M20  
 M20 v2   
 RE1000   
 WAG120N  not supported
 WAG160N  not supported
 WAG160N v2   not supported
 WAG310G  not supported
 WAG320N  not supported
 WAG54G2  not supported
 WAP610N  not supported
 WRT110   not supported
 WRT120N  not supported
 WRT160N v1   supported
 WRT160N v2   not supported
 WRT160N v3   supported
 WRT160NL supported
 WRT310N v1   supported
 WRT310N v2   not supported yet
 WRT320N  supported
 WRT400N  supported
 WRT54G2 v1   supported
 WRT54G2 v1.3 supported
 WRT54G2 v1.5 not supported
 WRT54GS2 v1  supported
 WRT610N v1   supported
 WRT610N v2   supported
 X2000not supported
 X2000 v2 not supported
 X3000not supported.

_

Fixing?  Heh.  

Aside from rate limiting WPS, there isn't much of a fix, and you can't turn it 
off either.
_

What about removing WuPS entirely?

WuPS is a total failure because:

1. Even if everything is fine 8 digits long is very weak because once you got 
the pin after 7 month - 2 years for example, you are completely pwned.

2. Pin number is fixed you can't change it to a longer number or maybe a string 
like omgponnies

3. Setting up a WPA2 password manually it's a piece of cake (even with keypad 
only cell phones), if some people are lazy, you don't have to weakening the 
security of a strong protocol.

Farth Vader

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Linksys Routers still Vulnerable to Wps vulnerability.

2012-02-10 Thread farthvader
Don't buy Linksys Routers they are vulnerable to Wifi unProtected
Setup Pin registrar Brute force attack.
No patch or workaround exist at the making of this post.

Vulnerable list and alleged patch availability:
source:http://www6.nohold.net/Cisco2/ukp.aspx?vw=1articleid=25154

 E1000  To Be Disclosed (aka we don't have idea)
 E1000 v2  To Be Disclosed
 E1000 v2.1  To Be Disclosed
 E1200 v1 early March
 E1200 v2 early March
 E1500 early March
 E1550 mid March
 E2000 To Be Disclosed
 E2100L mid March
 E2500 early March
 E3000 To Be Disclosed 
 E3200 early March
 E4200 v1 early March
 E4200 v2 To Be Disclosed
 M10 To Be Disclosed
 M20 To Be Disclosed
 M20 v2 To Be Disclosed
 RE1000 early March
 WAG120N To Be Disclosed
 WAG160N To Be Disclosed
 WAG160N v2 To Be Disclosed
 WAG310G To Be Disclosed
 WAG320N To Be Disclosed
 WAG54G2 To Be Disclosed
 WAP610N To Be Disclosed
 WRT110 To Be Disclosed
 WRT120N To Be Disclosed
 WRT160N v1 To Be Disclosed
 WRT160N v2 To Be Disclosed
 WRT160N v3 To Be Disclosed
 WRT160NL To Be Disclosed
 WRT310N v1 To Be Disclosed
 WRT310N v2 To Be Disclosed
 WRT320N To Be Disclosed
 WRT400N To Be Disclosed
 WRT54G2 v1 To Be Disclosed
 WRT54G2 v1.3 To Be Disclosed
 WRT54G2 v1.5 To Be Disclosed
 WRT54GS2 v1 To Be Disclosed
 WRT610N v1 To Be Disclosed
 WRT610N v2 To Be Disclosed
 X2000 To Be Disclosed
 X2000 v2 To Be Disclosed
 X3000 To Be Disclosed

The question is why a big company like Cisco/Linksys didn't release a
patch since almost 1 month and a half ?.

Well i have circumstantial evidence that Cisco outsource some of their
Linksys firmware routers to other companies (Arcadyan for example.) in
some cases source code is only available through NDA's or not
available at all. That's why they are taking so long to release a fix
to the WPS vulnerability. Fixing a vulnerability like this with all
the bureoucratic, QA and legal process wouldn't take no more than 2
weeks. I found some GPL violations by the way but this is beyond the
scope of this message (obfuscating firmware it's useless you now).

I apologize if i offended someone but IT security it's serious
business specially if someone use your wifi to commit crimes.
This vulnerability contains public and very easy to use exploit code,
it's not a Denial of Service.
Farth Vader.___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/