< Day Day Up > |
Now that we have reviewed the theory, let's examine the practical steps for cracking WEP. The most important resource for cracking a WEP-encrypted signal is time. The longer you capture data, the more likely you are to receive a collision that will leak a key byte. Based on empirical data, there is only about a five percent chance of this happening. On average, you need to receive about five million frames to be able to crack a WEP-encrypted signal. In addition to a wireless sniffer, you'll need a series of Perl scripts available from http:// sourceforge .net/projects/wepcrack/, called (appropriately) WEPCRACK . Once you have acquired the necessary tools, perform the following steps for cracking a WEP-encrypted signal:
|
< Day Day Up > |