Women in Technology

Hear us Roar

  Dispelling the Myth of Wireless Security
Subject:   The Myth of Easy WEP cracking
Date:   2003-11-23 19:35:05
From:   anonymous2
Response to: The Myth of Easy WEP cracking

Thanks Tim, I think you hit the nail on the head. The book is really very good but this hack had me scratching my head. What is scary is how few people even use WEP at all!
Full Threads Oldest First

Showing messages 1 through 3 of 3.

  • The Myth of Easy WEP cracking
    2005-02-06 12:31:12  BashT [View]

    I totally agree with you Tim. This was the topic for my research paper and I have about the same set up lab but I was using Knoppix STD. I had Airsnort run for one week and it did not log any weak IV keys. I email the developers of Airsnort asking them what's wrong and they told me the same information that you wrote, that old 802.11b hardware with old firmware are the only ones that are vulnerable to this attack so in other words if you are using 802.11g or n or you updated the latest firmware on your 802.11b hardware then you don't have to worry about the WEP key being hacked for now..
  • The Myth of Easy WEP cracking
    2005-02-03 20:10:14  IDunno [View]

    Tim F statements are not true. WEP is easyly cracked! if you have enough packet you can crack it in seconds! With 500.000 packets a 64 bit key is shown inmediatly. It is not a lot, you can insert traffic with replay attack.. look foer airsnort..
    I dont know who TIm F is. .but he doesn't now about the subject.
    • The Myth of Easy WEP cracking
      2007-07-28 09:02:19  DeeH [View]

      Depending on whose network you're cracking it may take longer to gather the packets, but with a tool like aireplay you can generate the traffic you need, so yeah opening aireplay & typing a few parameters in takes an extra 20-30 secs, but it's still a 5 minute hack altogether. WEP is easy if you know what to do...