Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

FBI break 128bit WEP in 3 mins

  • 18-04-2005 2:11pm
    #1
    Moderators, Sports Moderators Posts: 8,679 Mod ✭✭✭✭


    http://www.tomsnetworking.com/Sections-article111.php
    At a recent ISSA (Information Systems Security Association) meeting in Los Angeles, a team of FBI agents demonstrated current WEP-cracking techniques and broke a 128 bit WEP key in about three minutes. Special Agent Geoff Bickers ran the Powerpoint presentation and explained the attack, while the other agents (who did not want to be named or photographed) did the dirty work of sniffing wireless traffic and breaking the WEP keys.

    This article will be a general overview of the procedures used by the FBI team. A future article will give step-by-step instructions on how to replicate the attack.


Comments

  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    I thought when i saw the topic with "FBI" in the sentence that it was odd, odd that a government agency would publicly show everyone how to crack WEP.
    And i thought they would treat us all to some elaborate scheme that no one had ever used before.. like some new crypto technique.
    It seems that they just use tools available to anyone out there that wants them and now i don't understand why they are even telling us.

    I mean, if that were someone else, everyone would be up in arms talking about how lame they are, and yet just because they are the FBI, its a big deal.


  • Closed Accounts Posts: 345 ✭✭tck


    It's to inform people how insecure WEP is and not to use it, use WPA instead.

    They said they will be releasing a 'How to' - i'd like to take a look at it for sure.


  • Registered Users, Registered Users 2 Posts: 15,817 ✭✭✭✭po0k


    Thing is, alot of consumers (and probably alot of Small-to-Medium Businesses will implement WPA-PSK instead of full-on WPA, which isn't a whole lot better than WEP.


  • Moderators, Sports Moderators Posts: 8,679 Mod ✭✭✭✭Rew


    SyxPak wrote:
    Thing is, alot of consumers (and probably alot of Small-to-Medium Businesses will implement WPA-PSK instead of full-on WPA, which isn't a whole lot better than WEP.

    WPA-PSK is only vunreable if you use a short dictionalry key, as opposed to WEP where any key can be recovered.

    I downloaded and burned the live CD they used, works well but you would need to get you head around all the tools and have compatible hardware to make any real use of it.

    And what you mean by "full on WPA"?


  • Closed Accounts Posts: 7,230 ✭✭✭scojones


    Wpa2 > Wpa-anything


  • Advertisement
  • Moderators, Sports Moderators Posts: 8,679 Mod ✭✭✭✭Rew


    sjones wrote:
    Wpa2 > Wpa-anything

    WPA2 = WPA + AES with Hardware acceleration


  • Moderators, Society & Culture Moderators Posts: 32,286 Mod ✭✭✭✭The_Conductor


    Rew wrote:
    WPA2 = WPA + AES with Hardware acceleration
    Still not compatible with mixed mode networks :(


Advertisement