Catatan

Tunjukkan catatan dari September, 2010

Security Flaw on P1 DV 230 WiMAX Modem allows WiFi Stealing

P1′s DV 230 WiMAX Modem is one of the first WiMAX with WiFi modem that’s easy to use thanks to its simple plug and play approach. The only technical bit for the user is to enter the predefined WEP password which is uniquely customised for each USB WiFi Module. It looks all good and dandy but there’s just one small problem. We found out that the “unique” WEP password isn’t that unique after all. If you’ve seen or used one of these, you will notice that they will give a randomised Wireless Access Point name or SSID such as 07D24A and followed by a long WEP password such as 7D24A1FFB0. Sure, you think that this is all safe but recently it was brought to our attention that there’s a simple flaw with the way they created these unique WEP passwords. How to access your neighbour’s default unconfigured P1 DV 230 Modem? After reading up some postings online and comparison with our own, we’ve discovered a similar pattern in all P1 DV 230 modems. Here’s how you get the WEP Password from the SSID: