snarlydwarf wrote: > Mark Lanctot;183284 Wrote: > >> Looks like a pretty esoteric black hat crack to me. Although I don't >> fully understand the tool, it looks like made-up SSIDs and long, >> complex passphrases will still help. >> > > It's really a matter of timeshifting. Note that only advantage between > the first test (straight dictionary attack) and the second (precomputed > dictionary attack) is that the data set can be recycled for a given > SSID. > > If you change your SSID to not be stock, then the dictionary will need > to be recomputed. > > If you change your passphrase to not be one of the ones in the > dictionary, it will still not succeed. > > Which brings it back down to "don't choose lame-ass passwords", which > is already known. This attack only makes using lame-ass passwords with > stock SSID's weaker. > >
AFAICS these are all dictionary attacks. That's why you don't choose or invent a password but you generate a random one of 64 characters. There are sites on the web to help you (note that they will know your password). Luckily most of the time you will copy & paste your key (unless you're dealing with an SB) so it won't be too much work. Regards, Peter _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/lists/listinfo/discuss
