{"id":50790,"date":"2024-03-15T08:49:58","date_gmt":"2024-03-15T12:49:58","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=50790"},"modified":"2024-03-15T08:49:58","modified_gmt":"2024-03-15T12:49:58","slug":"wi-fi-pmkid-attack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/wi-fi-pmkid-attack\/50790\/","title":{"rendered":"Wi-Fi hacking using PMKID interception"},"content":{"rendered":"<p>Being concerned about the security of your wireless network is not as paranoid as some may think it is. Many routers have a setting enabled by default that makes your WPA\/WPA2-protected Wi-Fi network rather vulnerable. In this post, we\u2019ll discuss one of the most effective methods of hacking wireless networks that exploits this setting, and how to protect against it.<\/p>\n<h2>The simplest and most effective attack on WPA\/WPA2-PSK: PMKID interception<\/h2>\n<p>PMKID interception is the most effective, easy-to-execute, and completely undetectable method of attacking wireless networks protected by the WPA\/WPA2 standards. In essence, this attack involves intercepting the encrypted Wi-Fi passwords that wireless routers broadcast constantly \u2014 even when no devices are connected to them. Having obtained the encrypted password, the attacker can use the <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/brute-force\/\" target=\"_blank\" rel=\"noopener\">brute-force method<\/a> to decrypt it \u2014 and thereby connect to the Wi-Fi network.<\/p>\n<p>This attack can also be carried out on a large scale using a technique called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wardriving\" target=\"_blank\" rel=\"nofollow noopener\">wardriving<\/a>. Here, the attacker drives around a city scanning all available wireless networks and intercepting encrypted passwords that are broadcast by routers. Not much equipment is required for this \u2014 just a laptop, a long-range Wi-Fi adapter, and a powerful antenna.<\/p>\n<p>The intercepted encrypted passwords can be cracked on the go. But an attacker may prefer to wait until they\u2019re home and enter all the garnered passwords into a password-cracking tool on a high-performance computer (or rent computing power in the cloud). The effectiveness of this attack was recently <a href=\"https:\/\/e.vnexpress.net\/news\/news\/thousands-of-wi-fi-passwords-collectible-using-homemade-device-4716364.html\" target=\"_blank\" rel=\"nofollow noopener\">demonstrated<\/a> in Hanoi: a Vietnamese hacker scanned around 10,000 wireless networks and managed to decrypt the passwords for half of them.<\/p>\n<div id=\"attachment_50795\" style=\"width: 1370px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/15084542\/wi-fi-pmkid-attack-01.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50795\" class=\"size-full wp-image-50795\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/15084542\/wi-fi-pmkid-attack-01.jpg\" alt=\"Equipment required for mass Wi-Fi hacking using PMKID interception\" width=\"1360\" height=\"816\"><\/a><p id=\"caption-attachment-50795\" class=\"wp-caption-text\">This is all you need to hack 5000 wireless networks using PMKID interception. <a href=\"https:\/\/e.vnexpress.net\/news\/news\/thousands-of-wi-fi-passwords-collectible-using-homemade-device-4716364.html\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>How is it even possible to hack Wi-Fi using PMKID interception?<\/h2>\n<p>So why do wireless routers broadcast their Wi-Fi password all the time, albeit in encrypted form? Well, this is a basic function of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/IEEE_802.11r-2008\" target=\"_blank\" rel=\"nofollow noopener\">802.11r standard<\/a>, which is implemented on most routers and usually enabled by default. This standard enables fast roaming in Wi-Fi networks using multiple access points. To speed up the reconnection of the client device to new access points, they constantly broadcast their identifier \u2014 the very same PMKID.<\/p>\n<p>This identifier is a derivative of the Pairwise Master Key (PMK). More precisely, it contains the result of an SHA-1 hash function calculation, whose source data includes the PMK key and some additional data. The PMK key itself, in turn, is the result of an SHA-1 hash function calculation of the Wi-Fi password.<\/p>\n<p>In other words, the PMKID contains the wireless network password, hashed twice. In theory, the hashing process is irreversible, meaning it\u2019s impossible to recover the original data from the resulting hashed value. Presumably, the creators of the 802.11r standard relied on this when devising the PMKID-based fast roaming mechanism.<\/p>\n<p>However, hashed data can be brute-forced. This is made especially straightforward by the fact that people rarely use particularly strong passwords for wireless networks, often relying on fairly predictable combinations of characters instead. The creators of 802.11r obviously didn\u2019t take this into account.<\/p>\n<p>This problem was <a href=\"https:\/\/hashcat.net\/forum\/thread-7717.html\" target=\"_blank\" rel=\"noopener nofollow\">discovered<\/a> a few years ago by the team behind one of the most popular password recovery utilities \u2014 in other words, a password-cracking tool \u2014 Hashcat. Since then, specialized tools have been developed specifically for cracking intercepted PMKIDs.<\/p>\n<div id=\"attachment_50794\" style=\"width: 1454px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/15084433\/wi-fi-pmkid-attack-02.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50794\" class=\"wp-image-50794 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/15084433\/wi-fi-pmkid-attack-02.png\" alt=\"Hacking a Wi-Fi password from an intercepted PMKID\" width=\"1444\" height=\"1482\"><\/a><p id=\"caption-attachment-50794\" class=\"wp-caption-text\">Successful extraction of the password \u201chashcat!\u201d from the intercepted PMKID of a wireless network. <a href=\"https:\/\/hashcat.net\/forum\/thread-7717.html\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Thus, in practice, the attacker usually intercepts the PMKID containing the encrypted password, and then uses a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dictionary-attack\/\" target=\"_blank\" rel=\"noopener\">dictionary attack<\/a> \u2014 that is, they brute-force the most common passwords, which are collected in a database.<\/p>\n<h2>How to protect your wireless network from a PMKID attack<\/h2>\n<p>What can you do to prevent a PMKID interception attack on your wireless network? Fortunately, there are several protective measures that aren\u2019t too difficult to implement:<\/p>\n<ul>\n<li><strong>Create a password for your wireless network that is as long and complex as possible.<\/strong> If a PMKID attacker intercepts the hashed password from your Wi-Fi, they still need to decrypt it afterward, but the more complex the password \u2014 the less likely the attackers are to succeed. Therefore, to protect against this attack, create the longest and most unguessable password possible for your wireless network.<\/li>\n<li><strong>Disable PMKID transmission in the router settings.<\/strong> Unfortunately, not all routers allow this, but it\u2019s worth checking if yours has this setting. You can find it by searching for PMKID or 802.11r.<\/li>\n<li><strong>Switch to WPA3.<\/strong> If all your devices support this newer Wi-Fi security standard, it\u2019s worth considering switching to it: WPA3 is generally much more secure than WPA2 and, importantly, isn\u2019t susceptible to PMKID interception.<\/li>\n<li><strong>Set up a guest network.<\/strong> It can be tedious to have to frequently enter a strong password for the main network on new devices, so <a href=\"https:\/\/www.kaspersky.com\/blog\/guest-wifi\/23843\/\" target=\"_blank\" rel=\"noopener nofollow\">set up a guest network<\/a> with a simpler password. By the way, it\u2019s also a <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-secure-smart-home\/47472\/\" target=\"_blank\" rel=\"noopener nofollow\">good idea<\/a> to transfer potentially insecure things like IoT devices to the guest network.<\/li>\n<li><strong>Use the \u201c<\/strong><a href=\"https:\/\/support.kaspersky.ru\/help\/Kaspersky\/Win21.7\/en-US\/138204.htm\" target=\"_blank\" rel=\"noopener nofollow\">Devices on My Network<\/a><strong>\u201c<\/strong><strong> feature<\/strong>, which is available in our <a href=\"https:\/\/www.kaspersky.com\/plus?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Plus<\/a> and <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a> This feature shows a list of devices on your network and alerts you if a new device connects to it.<\/li>\n<\/ul>\n<p>For additional protection of transmitted data in case someone still manages to hack your Wi-Fi, use a VPN on all your devices to secure the internet connection \u2014 for example, our <a href=\"https:\/\/www.kaspersky.com\/vpn-secure-connection?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Secure Connection<\/a>, which is also included in the <a href=\"https:\/\/www.kaspersky.com\/plus?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Plus<\/a> and <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a> subscriptions.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here\u2019s how it works, and what you can do to protect yourself.<\/p>\n","protected":false},"author":2726,"featured_media":50792,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,2683,9],"tags":[111,282,3047,82,1791,187,43,473,422,709,174],"class_list":{"0":"post-50790","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"category-tips","10":"tag-attacks","11":"tag-cybersecurity","12":"tag-guest-wi-fi","13":"tag-hacking","14":"tag-kaspersky-secure-connection","15":"tag-passwords","16":"tag-privacy","17":"tag-routers","18":"tag-threats","19":"tag-vpn","20":"tag-wi-fi"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/wi-fi-pmkid-attack\/50790\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/wi-fi-pmkid-attack\/27186\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/wi-fi-pmkid-attack\/22494\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/wi-fi-pmkid-attack\/11521\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/wi-fi-pmkid-attack\/29862\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/wi-fi-pmkid-attack\/27361\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/wi-fi-pmkid-attack\/27125\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/wi-fi-pmkid-attack\/29808\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/wi-fi-pmkid-attack\/28623\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/wi-fi-pmkid-attack\/37126\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/wi-fi-pmkid-attack\/12171\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/wi-fi-pmkid-attack\/21638\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/wi-fi-pmkid-attack\/22351\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/wi-fi-pmkid-attack\/31038\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/wi-fi-pmkid-attack\/27548\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/wi-fi-pmkid-attack\/33368\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/wi-fi-pmkid-attack\/32994\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/wi-fi\/","name":"wi-fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=50790"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50790\/revisions"}],"predecessor-version":[{"id":50793,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50790\/revisions\/50793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50792"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=50790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=50790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}