Site icon Sophos News

The Wi-Fi router with a password that takes just 70 guesses…

When you buy a new device, especially for use at home, you probably want to unpack it, connect it up and start using it as quickly as possible.

It’s not like the 1980s, when to play a game on your cool new home computer you first had to type in hundreds of lines of BASIC programming without making any serious mistakes, then debug what you’d typed in, then lose it all when the computer crashed, then type it in all over again more carefully…

Whether it’s your trendy internet kettle, a new security camera or a fancy “digital doorbell,” you’re probably looking for a plug-and-play experience.

Device vendors typically take one of three approaches:

  1. Ignore security altogether, so the default security settings are “no security at all.” If the device does have security built in, you have to set it up later, after connecting it up for the first time.
  2. Preconfigure some one-size-fits-all settings and print them in the manual. Everyone starts from the same place, but you can tighten things up later.
  3. Choose random security settings for each device and print them on a card that’s stuck underneath or included in the box. Ideally you will tighten things up later, but if you don’t, you’re still better off than in case (1) or (2).

Of course, case (3) is the trickiest for a vendor, because it means that each device has to be customised, digitally and physically, with a unique configuration file installed in the firmware, and a matching sticker or card printed and included in the package.

Nevertheless, case (3) is the best of the lot, because it means you have some security – such as passwords that can’t simply be searched out on Bing or Google – at the outset.

It’s especially handy for a home Wi-Fi router, where a globally-predictable default configuration might expose your whole network to easy attack, even if only for a short period while you were setting it up.

We don’t normally recommend writing down your passwords and keeping them in an obvious place, but sticking the default password on the underside of a Wi-Fi router isn’t a bad idea.

A crook would have to break into your house and turn over your router just to get the password, rather than hanging around across the road and guessing your password from a distance:

At least, that’s the theory.

Unfortunately, a password that’s unique isn’t necessarily unpredictable or hard to guess, even if it looks complicated.

In the example above, first publicised on Twitter at the end of 2015, router vendor TP-LINK has gone to the trouble of printing a one-off label for each router it shipped…

…yet it hasn’t really done any better than case (1) above.

Here’s why.

Both the network name and the Wi-Fi password are directly (and very obviously) derived from the MAC.

And the MAC address (officially short for Medium Access Code, but often called the Media Access Code), although unique, is not meant to be a secret.

In fact, it’s deliberately and purposefully broadcast in every Wi-Fi packet from the router, precisely because it is unique and thus won’t accidentally clash with any other network devices nearby.

In other words, anyone with a Wi-Fi sniffing tool such as Kismet or Wireshark can figure out your MAC address, and that’s by design.

Therefore, if you have a TP-LINK router of the sort pictured above, and you haven’t changed the defaults, anyone can guess – in fact, they can precisely compute – both your network name and your password, as soon as they see your MAC address.

It gets worse, of course, because they don’t even need a network sniffer.

They can just ask their laptop to show nearby networks, and when one called TP-LINK_AABBCC shows up, they know six of the eight characters in the default password, which will be ??AABBCC.

After just 256 guesses for the value of the hex digits denoted by ??, they’re certain to get in if you are still using the defaults.

Actually, it’s worse than that, because the first three bytes of every MAC address is the OUI, or Organisationally Unique Identifier, issued to the vendor of the device in advance.

(Two hex digits make up one byte, so three bytes are represented by six hex digits.)

Sophos’s wireless access points, for example, all start with 00-1A-8C, which denotes Sophos Limited. This simplifies the issuing process, like pre-allocating number plates starting MZ to the city of Mainz in Germany, or WI to Wiesbaden on the other side of the Rhine.

TP-LINK is a big enough vendor that it has not one but 85 OUIs allocated to it, but those have only 70 different values in the their third byte:

That reduces the number of Wi-Fi password guesses to 70 once you’ve seen that TP-LINK_ prefix.

By the way, many routers offer an option called “network hiding” or “SSID hiding,” where your network doesn’t show up in the list that nearby phones or laptops will display.

But hiding your network name doesn’t help in this case: it’s a safety feature that stops people connecting to you by mistake, not a security measure that stops them connecting altogether.

That’s because your Wi-Fi network reveals its name in any packets sent and received by devices that have already connected, making your network name a matter of public record anyway.

Even if the network name were a secret, your access point’s MAC address reveals the vendor, thanks to the OUI in first three bytes. That’s why sniffers like Wireshark and Kismet can show in real time the vendors of the network devices they’ve captured – it’s a simple lookup in the OUI table. So an attacker could guess when to try TPLINK_ at the start of the network name, whether it was known or not.

WHAT TO DO?

Here’s that video:


Cool Wi-Fi mosaic image courtesy of Shutterstock.

Exit mobile version