Chapter 5. Cracking WEP


IN THIS CHAPTER

  • WEP Review

  • Data Analysis

  • Technical Example

  • IV Collision

  • Key Extraction

In Chapter 4, "WEP Security," we examined the intricacies of the Wireless Equivalent Privacy (WEP) scheme and how it works with RC4. However, as you will see, RC4 as implemented in WEP is inherently flawed. Although WEP does offer a modicum of protection, you will now learn how to crack it black and blue with just a few hours of wireless sniffing. By cracking the protocol, you learn not to rely solely on WEP to secure your wireless network.



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net