Your Wi-Fi network is too easy to hack — how to protect yourself

A home wireless router near a child using a laptop.
(Image credit: Casezy idea/Shutterstock)

Imagine walking around your hometown and discovering that you could break into more than two-thirds of the Wi-Fi networks you come across.

That's what happened to Israeli security researcher Ido Hoorvitch, who "sniffed" Wi-Fi networks in the city of Tel Aviv without logging into them, but nevertheless found that he could "crack" the access passwords for most of them. 

"I gathered 5,000 Wi-Fi network hashes as my study group by strolling the streets in Tel Aviv with Wi-Fi sniffing equipment," wrote Hoorvitch in a blog post yesterday (Oct. 26). 

No fancy equipment needed

That data-gathering equipment was nothing more than a laptop running the free Ubuntu operating system and the free WireShark network packet analyzer, plus a $50 strong network card with external antennae strapped to Hoorvitch' backpack to detect as many Wi-Fi networks as possible. 

Hoorvitch used another free program called Hashcat to crack the passwords. 

"At the end of the research," he added, "I was able to break more than 70% of the sniffed Wi-Fi networks passwords with relative ease."

Because of his day job at security-solution provider CyberArk (disclosure: Tom's Guide is a client), Hoorvitch was able to use the company lab's new password-cracking rig containing eight Nvidia Quadro RTX 8000 graphics cards that likely cost about $40,000 in total. 

But he stressed that all the password cracking he did could also be done on a regular PC, in perhaps less than 10 minutes per password if you were targeting a single network.

"You do not need a cracking rig" to do this, Hoorvitch wrote.

Dismal passwords

The point here is that most people, and some businesses as well, use terrible Wi-Fi access passwords. Hoorvitch notes that many Israelis (and 44% of his sample) use their cellphone numbers as the passwords for their home Wi-Fi routers. Why that is, we don't know, but it did give Hoorvitch a good head start. 

Even among those Wi-Fi networks that didn't use cell numbers, nearly half (48%) used terrible, easy-to-guess passwords that routinely appear on lists of the most common passwords. Only 30% of the 5,000 had access passwords that were too strong to easily crack.

"I hypothesized that most people living in Israel (and globally) have unsafe Wi-Fi passwords that can be easily cracked or even guessed by curious neighbors or malicious actors," Hoorvitch wrote.

How and why to have a strong Wi-Fi access password — and a strong admin one too

So what, you wonder? What's the harm if some neighbor's kid gets access to my Wi-Fi network? 

A lot could happen. The neighbor's kid could use your network to download pirated movies and software, possibly exposing you to legal consequences or even higher bills if your monthly data usage is capped. 

That kid, or anyone else within radio range of your home Wi-Fi router, could also use the network access to attack devices in your home, such as smart TVs, printers or older computers. Being inside a network gives an attacker great advantages that aren't available from outside.

"The bottom line is that in a couple of hours and with approximately $50, your neighbor or a malicious actor can compromise your privacy and much more if you don’t have a strong password," Hoorvitch wrote.

To make sure interlopers aren't sneaking into your home Wi-Fi network, create long, strong, unique access passwords. If you're having trouble creating and remembering such passwords, then use one of the best password managers; some of them are free. 

Routinely check your home Wi-Fi network's logs to see which devices have accessed your network recently. Follow up with anything you don't recognize, and if it turns out to not be one of yours, use your network's administrative interface to block such devices.

If you can, create a "guest" network segment or second network for visitors to use. The guest network should have a different access password from the main one. It might be best to put less secure devices — smart TVs, other smart appliances — on the guest network to minimize the potential harm if one of them were to be hacked.

Disable remote administrative access to the network from the internet, and turn off Universal Plug and Play, a protocol that makes it too easy for new devices to find each other on the network.

And most important of all, make sure your Wi-Fi network's administrative password is not the same as your access password and is even stronger. (Again, one of the best password managers will come in handy.) 

How this was done

We'll skip over most of the technical details of how Hoorvitch did this, partly because we don't completely understand them ourselves. (You can read all about how to do it on Hoorvitch's blog post.)

But he used a fairly new way to crack Wi-Fi passwords. It takes advantage of the fact that many of the Wi-Fi access points and routers using the WPA2-PSK, aka WPA2 Personal, security protocol broadcast a numerical ID to all passing devices, whether they're logged in or not. 

The routers and access points do this so that devices can quickly rejoin their networks without having to recalculate encryption values. (Some enterprise networks use a different access standard that isn't vulnerable to this attack.)

That ID, called the PMKID, is formed by running the Wi-Fi network access password, the Wi-Fi network name, the router/access point and client device MAC addresses (fixed network device IDs) and a couple of other factors through a "hashing" algorithm that creates a long, supposedly irreversible string of digits.

The problem is that, except for the Wi-Fi access password, all the factors used to create the PMKID are known quantities. The router broadcasts its own MAC address and its network name. The client device knows its own MAC address. The other factors are part of the formula.

So if the only unknown factor is the access password, then it can be isolated and subjected to "cracking" attacks. 

Those attacks don't have to be done on the spot: Because the PMKIDs can be logged along with MAC addresses and network names, the attacks can take place offline, after the attacker has returned home.

Hashcat, the free password-cracking tool, can be used to generate PMKIDs from lists of potential Wi-Fi passwords. From there it's just a question of seeing which generated PMKIDs match real PMKIDs in the sample.

Taking apart the passwords

Because many Israelis just use their cellphone number as passcodes, this gave him a head start. He said Israeli cell numbers are all 10 digits that invariably begin with "05," leaving only eight digits — 100 million possible numerical combinations — to be calculated. One hundred million is a big number to a human, but it's nothing to a powerful late-model PC.

Using the cellphone-number method, Hoorvitch was able to figure out 2,200 — 44% — of the Wi-Fi access passcodes in his sample set. That's kind of insane.

For the remaining 2,800 uncracked passcodes, Hoorvitch attacked them with the passwords in the RockYou list. That's a freely available text file containing more than 14 million unique passwords that in 2009 were stolen (from a company that developed Facebook and MySpace widgets) and then dumped online by hackers.

Twelve years later, the most often used passwords in the RockYou list — "123456,"  "12345," "123456789," "password," "iloveyou" and so on — are still among the most often used passwords in English-speaking countries. 

Using the RockYou list, Hoorvitch was able to crack an additional 1,359 Wi-Fi access passwords, 26% of the total sample size. That left only 30% of the passwords uncracked.

How vulnerable is your router?

The ironic thing is that home Wi-Fi routers don't need to broadcast PMKIDs. These types of IDs are mainly used in workplaces and other large environments in which devices — laptops, smartphones — roam about and seamlessly connect to and disconnect from multiple Wi-Fi access points that are part of the same Wi-Fi network.

Nonetheless, PMKID distribution is turned on by default in many home Wi-Fi routers, although we weren't able to find any indication that it was activated on our own aging Netgear router. (One way to check is to see if "802.11r", the specification that defines PMKID, is enabled or mentioned in your home router administrative interface.)

PMKID would be on for many of the workplace Wi-Fi networks that Hoorvitch sniffed.

"Not all routers support roaming features and are, therefore, not vulnerable to the PMKID attack," he wrote. "However, our research found that routers manufactured by many of the world's largest vendors are vulnerable."

Unfortunately for us, he didn't provide a list of those router vendors.

Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Read more
Graphic of fibre optic cables attacking code
An estimated 46,000 VPN servers are vulnerable to being hijacked
TP- Link Archer AX55 sitting on desk
This Chinese router company with 65% market share in the US could be banned — what you need to know
The MSI Roammii BE Lite dual-band mesh Wi-Fi 7 router on a table
Upgrading to Wi-Fi 7 is about to get more complicated — and these new routers are to blame
A person typing on a computer while hackers use phishing to steal a file from their computer
It's Safer Internet Day – here are 5 tips to help you be safer online
Surfshark graphic of 2024 data breaches
Nearly 700 million American records were leaked in 2024
Black and white photo of a woman, with her eyes obscured by pixels
It's Data Privacy Day – 4 ways to protect your info online
Latest in Online Security
and image of the Google Chrome logo on a laptop
Google Chrome at risk from shape-shifting browser extensions — how to stay safe
Green skull on smartphone screen.
Over 1 million Android devices infected with password-stealing, pre-installed botnet malware — how to stay safe
Android 12
Google March Android Security Update fixes two high severity vulnerabilities — update now
An Android bot next to an Android TV remote
Millions of Android TVs hijacked in massive botnet — how to see if yours is at risk
Poster of Elon Musk saying "I am stealing from you"
Elon Musk's DOGE blocked from accessing your data – and 3 in 4 Americans agree
A fake text message on a smartphone being held by both hands.
Toll road scams are worse than ever — what to look for and how to stay safe
Latest in News
Prime Gaming's selection of free games for March 2025
Amazon Prime is giving away these 20 games in March — get Fallout, Saints Row 3, and more free games now
Hugh Grant as Mr. Reed in "Heretic"
Max top 10 movies — here’s the 3 worth watching right now
Nintendo Switch 2
Nintendo Switch 2 price rumors and predictions — everything we've heard so far
Samsung Galaxy S25 Edge back
Samsung Galaxy S25 Edge latest leak hints at good news for pricing
Apple Intelligence logo on iPhone
Apple confirms Siri 2.0 is delayed — 'it’s going to take us longer than we thought'
NYTimes Connections
NYT Connections today hints and answers — Saturday, March 8 (#636)