Vulnerabilities in WLAN have been and will continue to be exploited. The following is a listing of the well-known attacks that exist today. Paper from the University of California, Berkeley study (2001) that found that the IV (initialization vector), sent in plaintext, will repeat itself over time. Security of the WEP Algorithm: http://www.gta.ufrj.br/~eric/tese/artigos/wep-faq.html FMS Attack (Fluhrer, Mantin, and Shamir) explored shortcomings with the RC4 algorithm. WEP does not have a key rotation method, and after 100,000 to 1,000,000 packets, the IV can be broken and the WEP key derived. "Your 802.11 Wireless Network Has No Clothes": http://www.cs.umd.edu/~waa/wireless.pdf |