Posted 16 December 2012 - 14:49
"A quick Google search of "wpa tkip crack" provides plenty of off-the-shelf tools that any script kiddie can download and crack into your network"
This goes for WPA2 AES as well if you use P@55w0rd! as your PSK
Please show me attack other than bruteforce/dictionary PSK that allows you into tkip vs aes
Are you talking about the attack from 2008? Dude what part do you not understand about this attack??
"This is not a key recovery attack. TKIP keys are not compromised and it does not lead to decryption of all subsequent frames."
With WEP in like 30 seconds I can be ON YOU NETWORK!!! And watching ALL traffic, using your internet connection, run attacks against your other machines, etc. etc.. Sorry but there are no other attacks other then breaking the PSK that allow you do to this. Be it tkip or aes. So making a statement that tkip is akin to wep is just FUD pure and simple.
Yes any script kiddie can run these attacks, yes can download a simple script to get you on any WEP network in a matter of seconds. Where is this attack against tkip? Point them out, name them. If you would read any of the hits from your own google example you would see this.
Are you talking about grabbing the handshake, and doing a deauthenticate against a client to get the handshake - sure this can be done very quickly. And sure in a sense is easier than WEP.. Problem is with wep there is a limited key space, and I can crack that in seconds sure.
And if you used something like the above P@55w0rd! as your psk then sure your not very secure -- but if you use something like,
Good freaking luck using your dictionary, bruteforce or even rainbow tables on that. So again saying WPA tkip is as insecure as wep is just not true.
edit: just as a final note, Let me quote one of the guides from the actual makers of very popular crack tools guides on cracking wpa/wpa2 on their website. Now they don't distinguish between tkip or aes in this statement. If tkip wpa was as weak as wep like you say. I would think a site like this would clearly point that out, but what they do say is this
"if you want to have an unbreakable wireless network at home, use WPA/WPA2 and a 63 character password composed of random characters including special symbols."
Now should you use wpa2 aes, yes if your devices all support this - then by all means this is what you should be using with a SECURE PSK!! Or you still leave yourself open to something as simple as a dictionary attack.