dslreports logo
 story category
Networking 101: What is WPS, and Why You Should Not Use It

A critical need of a network is security. As wireless networks can be accessed from a distance, it is quite important that they are secure. This is typically done via a password.

While the password is simple in concept, it can be troublesome in actual use. The recommendation is to have the password be 12 or greater characters, with a combination of letters, both upper and lower case, and numbers as well as special characters. Users tend to gravitate towards much easier to remember dictionary phrases, such as the all too common “password,” “qwerty,” or “123456.” While we can chuckle at the naiveté of such simple phrases, this does become quite a bit more complex for a home user that has to keep multiple passwords organized for email accounts, computer logins, work accounts, and countless web services that require a login.

WPS and why you should avoid it like the plague

A possible solution dates back to 2006, known as WPS, which stands for Wi-Fi Protected Setup. WPS was designed to offer a simplified method of adding a new device onto a router’s network. While these days we think about this technology in terms of a little button on the device to be added, as well as on the router. By pressing buttons, a passphrase gets generated, sent back and forth, and the new device is added to the network securely. The intention was that this was to be more secure as the passphrase would be from random characters (not a dictionary word), and a strong password containing the elements discussed above would be used rather than an insecure one.

Click for full size
While the push button method became the most popular implementation, it is not the only one. Another method involved a PIN that was on a sticker on the router. By entering it into the device to be added, a passphrase got created. Yet another method is with a USB flash drive. This is typically created in a host computer already on the network, and then brought to the next computer to be added. A final method involved NFC (near field communication) between devices when they were brought in proximity, although this did not see wide deployment. The PIN and push button currently are the only two methods that are used for WPS.

While WPS was born out of convenience, it became known for a security flaw. The more popular implementation with the push button seems that it would be secure as it was based on physical access to both the router and the client device. However, it really is based on the PIN method which uses a eight digit numeric code. While an eight digit code should offer at least a moderate level of protection, it actually is worse than that as it really is two sets of a four digit code.

Click for full size
With the router and network able to be accessed via a four digit numeric code- which would have a finite 10,000 combinations, this makes WPS quite vulnerable to a brute force attack. On top of that, consumer routers do not “Time out” after multiple PIN attempts, a feature that would lock the hacker out for a finite or increasing amount of time after each incorrect guess, making the router even more vulnerable as it is available for an unlimited number of guesses. There is even software available that is built specifically to hack WPS that takes advantage of this.

Now that we know that WPS is highly insecure and easy to crack, precautions must be taken. The ideal would be to have a router that does not have any WPS. However, WPS has been included on most modern routers as a standard feature. The general advice is to disable WPS in the router settings. While this does often work, there are reports that even with WPS set to off, specifically on Linksys routers, that WPS is still vulnerable to PIN hacking as described above. Some routers, such as the Netgear shown in the screenshot above allow WPS to only be enabled via push button, but not via PIN.

While WPS was born out of convenience to connect devices, it represents a significant security vulnerability. Go into the router settings, and close the hole as much as possible, as manufacturers continue to include this in their routers. Here’s hoping that the router manufacturers kick WPS to the curb and move on to a better standard for this need.

This article was contributed by the DSLReports.com community. If you'd like to receive payment for writing content like this for our front page, please drop us a line.

Most recommended from 37 comments



kdwycha
join:2003-01-30
Ruskin, FL

8 recommendations

kdwycha

Member

WPS

Comes in handy when doing technical support and the customer has no clue what their wireless password is. Insecure or not it can save hours of average handle time.
InternetJeff
I'm your huckleberry.
join:2001-09-25
.

4 recommendations

InternetJeff

Member

Scaremongering

Unless you're a high value target, no one is likely to try to hack your WPS protected WiFi. Little is said in the "article" about actual people getting hacked by this route.

Maybe if you're some celebrity or politician ... but unlikely if you're some anonymous slob in Stillwater Arkansas operating a WiFi router in his trailer.

woody7
Premium Member
join:2000-10-13
Torrance, CA

3 recommendations

woody7

Premium Member

hmmmmmm

Never use it...........................always set up on my own.........

Boricua
Premium Member
join:2002-01-26
Sacramuerto

3 recommendations

Boricua

Premium Member

WPS - what piece of s**t

Never used it and never had a desire to use it. My password consists of my name, and old phone number and zip code I used to live at. All with numbers, letters (upper and lower) and special characters, e.g. 5 becomes % since on the keyboard it's the same key.

Demonfang
join:2011-04-21
Spring Mills, PA

3 recommendations

Demonfang

Member

WPS is crap

Not only is it a giant security hole, but I have NEVER had it work for me. I'll stick to my illogical combinations of words and whatnot to do the job.

Mahalo
join:2000-12-20
united state

2 recommendations

Mahalo

Member

WPS Locked Out/Rate Limiting

quote:
On top of that, consumer routers do not “Time out” after multiple PIN attempts, a feature that would lock the hacker out for a finite or increasing amount of time after each incorrect guess, making the router even more vulnerable as it is available for an unlimited number of guesses.

Consumer routers do perform Rate Limiting and WPS Locked out functions. With Rate Limiting it will increase the time it take to crack the PIN and with WPS Locked your hosed until it is reset. Once that happens you then proceed with capturing the handshake and run it against a wordlist file. I use Wifte (which uses Reaver) in Kali with a TP-722N adapter. With Wifite you can proceed through Pixie, PIN, and handshake attack for each AP that you are testing against.