IN THIS CHAPTER
In Chapter 4, "WEP Security," we examined the intricacies of the Wireless Equivalent Privacy (WEP) scheme and how it works with RC4. However, as you will see, RC4 as implemented in WEP is inherently flawed. Although WEP does offer a modicum of protection, you will now learn how to crack it black and blue with just a few hours of wireless sniffing. By cracking the protocol, you learn not to rely solely on WEP to secure your wireless network. |