Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That’s actually what the device in the article does.

> The device, which cost about $100 to build, was equipped with a 3G-enabled modem, allowing it to be remote-controlled so long as it had cell service.

> The warship listens for a handshake — the process of authorizing a user to log onto the Wi-Fi network — then sends that scrambled data over the cellular network back to the attacker’s servers, which has far more processing power to crack the hash into a readable Wi-Fi password.

It’s not uncommon for red teams to do something similar: pull a bunch of ciphertext and hashes from the target network, ship them off to their GPU farm at the office, wait for results.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: