Sign in to follow this  
Followers 0

I need information on WEP

14 posts in this topic

Posted

WIRED EQUIVALENT PRIVACY (WEP) a wireless security measure

hi, I need to try and find more information on WEP I am doing a project (1 of many ) and i need to learn everything I can about WEP ... in extreme detail .. I need to see how and why it is so easily exploited with detailed explanations (I dont need to know how to hack it...just making that clear)

any help will be great..

once again to be clear (just so admins know) I am not asking how to hack a WEP I am asking about the wifi encryption standard and details on the know exploits .. for example, when a key is being obtained handshakes and arps are exchanged ... why? how? what is then done with the information? etc

Share this post


Link to post
Share on other sites

Posted

Windows Entertaintment Pack (for win 3.x) ?

Share this post


Link to post
Share on other sites

Posted

Windows Entertaintment Pack (for win 3.x) ?

I see your point... there we go all sorted

Share this post


Link to post
Share on other sites

Posted

Look up the RFCs and IEEE standards on it which will give you all the knowledge you need to know...?

Here's one http://ieeexplore.ie...Emetadata&pos=0

woowww that is a price tag....

Share this post


Link to post
Share on other sites

Posted

Join a college/university that subscribes and you'll get it free.

Share this post


Link to post
Share on other sites

Posted

Removed

2 people like this

Share this post


Link to post
Share on other sites

Posted

You might find some useful info and tools here, they have a forum too

http://www.backtrack-linux.org/

Share this post


Link to post
Share on other sites

Posted

The evn show post

/thread ;)

Not much more to say after that detailed way of saying RTFM ;) Loved it!!

Share this post


Link to post
Share on other sites

Posted

Join a college/university that subscribes and you'll get it free.

I will get it from my uni then they should have it

You don't learn (and actually understand) that stuff in "extreme" detail in a short amount of time. It's like saying you want to know physical chemistry but don't want to get bogged down with all those orbital shapes and baryons and stuff. To get a solid understanding is going to take some real work so maybe you want to scale back a bit.

I Know I say in my post I need to know everything ... its more... I need access to everything but I know specifically what I am looking for :p its just to long to google search it and I was just coming here for sources or someone with an expert knowledge... I have read your post and will take your points on .... I am going to start ... there is a couple of issues with wep that I will be directly addressing for a program I am writing ... simple OPN WEP to start with then eventually moving on untill my program has all aspects of WEP security down..

Share this post


Link to post
Share on other sites

Posted

Removed

Share this post


Link to post
Share on other sites

Posted

IEEE has most of your answers, other than that like suggested above look at reports/papers and such

Share this post


Link to post
Share on other sites

Posted

Have a listen. This is from Security Now #89

Even More Badly Broken WEP

Leo and I review the operation of wireless network security and discuss in detail the operation of the latest attack on the increasingly insecure WEP encryption system. This new technique allows any WEP-protected WiFi network's secret cryptographic key to be discovered in less than 60 seconds.

http://www.grc.com/sn/past/2007.htm

http://media.grc.com/sn/sn-089.mp3

Share this post


Link to post
Share on other sites

Posted

Kinda the opposite of RTFM: the FM tells you how it's supposed to work and how to build an implementation. It doesn't tell you why an implementation is weak (if it did, we'd never have used it). I went for more of a "read the bug reports and patch notes" recommendation.

It sounds more like you don't really care about how or why WEP is weak - that's going to be a discussion for math or comp-sci nerds who like to use lots of letters and symbols when they talk about things. You sound like you're more interested in the steps necessary to exploit a vulnerability.

Consider two imaginary descriptions of a weakness in some piece of cryptographic software:

[*]Algorithm X has a bias in byte 3 that makes it 1/2^384 % more likely to return 0 than any other a-bit sequence. You can use that to discover 1 bit of key information in time 2^56 with 95% probability. (1.5 assloads of math and stats follow here. Lots of brackets and letters)

[*]Capture 300,000 packets, then compute byte 5 + byte 9 xor byte 3 for each packet. Count how many times you get 1, 2,3,4,5,

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.