WEP authentication, why WEP authentication scheme is flawed and how it can be attacked

WEP authentication, why WEP authentication scheme is flawed and how it can be attacked

am 01.08.2006 18:51:23 von Johnny

Can someone please explain to me

WEP authentication?
Why WEP authentication scheme is flawed?

How it can be attacked?

Thank you,

Johnny.

Re: WEP authentication, why WEP authentication scheme is flawed andhow it can be attacked

am 01.08.2006 20:20:41 von Sebastian Gottschalk

Johnny wrote:
> Can someone please explain to me

Yes, Wikipedia can.

Re: WEP authentication, why WEP authentication scheme is flawed and how it can be attacked

am 01.08.2006 21:31:14 von comphelp

"Johnny" writes:

> Can someone please explain to me
>
> WEP authentication?
> Why WEP authentication scheme is flawed?
>
> How it can be attacked?
>
> Thank you,
> Johnny.

Johnny,

Google it up. WEP is crytographically weak and there are a number of
different rather efficient attacks for it. Packet reinject to gather
enough IV's, FHS or any of a handful of cryptographic attacks against
em, and the WEP key is yours.

Detail gathering is left as an exercise for Johnny.

Best Regards,
--
Todd H.
http://www.toddh.net/

Re: WEP authentication, why WEP authentication scheme is flawed andhow it can be attacked

am 03.08.2006 04:55:40 von John Hyde

on 8/1/2006 9:51 AM Johnny said the following:
> Can someone please explain to me
>
> WEP authentication?
> Why WEP authentication scheme is flawed?
>
> How it can be attacked?
>
> Thank you,
>
> Johnny.
>
>

Hey, Johnny, aren't you M0nst3r? Still got homework?

Re: WEP authentication, why WEP authentication scheme is flawed andhow it can be attacked

am 03.08.2006 22:08:24 von Tocalusa

John Hyde wrote:
> on 8/1/2006 9:51 AM Johnny said the following:
>> Can someone please explain to me
>>
>> WEP authentication?
>> Why WEP authentication scheme is flawed?
>>
>> How it can be attacked?
>>
>> Thank you,
>>
>> Johnny.
>>
>>
>
> Hey, Johnny, aren't you M0nst3r? Still got homework?

Heheheh, LOL... At least, he/she is persistent

Re: WEP authentication, why WEP authentication scheme is flawed and how it can be attacked

am 04.08.2006 15:29:44 von Brian

John Hyde wrote:
> on 8/1/2006 9:51 AM Johnny said the following:
> > Can someone please explain to me
> >
> > WEP authentication?
> > Why WEP authentication scheme is flawed?
> >
> > How it can be attacked?
> >
> > Thank you,
> >
> > Johnny.
> >
> >
>
> Hey, Johnny, aren't you M0nst3r? Still got homework?

I guess school's back in session.