Dispelling the Myth of Wireless Security
Subject:   Wireless Security
Date:   2003-08-16 04:02:24
From:   trevmar
Response to: Wireless Security

Actually, I have found that Airsnort cracks both short and long keys in about the same amount of time (1 million to 10 million packets). The number of packets needed is more dependent on the actual code and the point in the pingflood sequence at which the AP is at any point in time (because certain regions of the WEP key space are more susceptible than others).

I haven't really noticed any extra security from using 'clever' HEX codes rather than the ascii shorthand.

However, Lucent changed its Orinoco firmware in September 2002 to stop its cards transmitting weak packets. I have never managed to crack an Orinoco card running up-to-date software.

Likewise for Cisco - the LM350 series of cards are invisible when running WEP.

But you only need one user on the network to be using a card based on the PRISM or some other chipset (eg, D-Link, Linksys, Zoom) and the whole network can be easily cracked.

Anyway, good work Rob, an excellent explanation...

Trevor Marshall

Full Threads Oldest First

Showing messages 1 through 2 of 2.

  • Wireless Security
    2003-11-16 14:46:05  trystano [View]

    Hi all,

    I was intending to find a forum on this site, but haven't managed to find one :-(.

    Anyway, I have a question to ask on security of m-commerce. I am doing a independant study that involves me researching the security measures taken when carrying out transactions over wireless networks.

    I was wondering if PKI is used as the main technology used to secure wireless transactions. Is WEP similar to this? If not, what is WEP used for?

    Can someone please assit me (if possible, direct me to some decent researches).

    • Wireless Security
      2003-11-19 19:14:07  anonymous2 [View]

      You can find the best forum for wireless questions at
      Make sure to register to be able to access the full forum.