There are basically two types of cracks namely WEP cracking refers to exploits on networks that use WEP to implement security controls. WEP does not provide a centralized key management system.Ĭracking is the process of exploiting security weaknesses in wireless networks and gaining unauthorized access. Changing keys especially on large networks is challenging. Keys management is poorly implemented.WEP is based on passwords this makes it vulnerable to dictionary attacks.Weak Initial values combinations do not encrypt sufficiently.The lower possible value of the secret key makes it easy to crack it. The total length of both the initial value and secret can either be 64 bits or 128 bits long. The length of the initial value (IV) is 24 bits long while the secret key can either be 40 bits or 104 bits long. The stream cipher input is made up of an initial value (IV) and a secret key. WEP uses the RC4 encryption algorithm to create stream ciphers.This leads to unauthorized access to the network. The bits in the encrypted stream and the checksum can be modified by the attacker so that the packet is accepted by the authentication system. CRC32 integrity check can be compromised by capturing at least two packets. The integrity of the packets is checked using Cyclic Redundancy Check (CRC32).WEP has significant design flaws and vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |