| Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | About BLU |
We implemented an attack against WEP, the link-layer
security protocol for 802.11 networks. The attack was
described in a recent paper by Fluhrer, Mantin, and
Shamir. With our implementation, and permission of the
network administrator, we were able to recover the 128
bit secret key used in a production network, with a
passive attack. The WEP standard uses RC4 IVs
improperly, and the attack exploits this design
failure. This paper describes the attack, how we
implemented it, and some optimizations to make the
attack more efficient. We conclude that 802.11 WEP is
totally insecure, and we provide some recommendations.
http://www.cs.rice.edu/~astubble/wep/wep_attack.html
They also mentioned,
"Surprisingly, capturing WEP encrypted packets off of our wireless
network proved to be the most difficult part of the attack."
-
Subcription/unsubscription/info requests: send e-mail with
"subscribe", "unsubscribe", or "info" on the first line of the
message body to discuss-request at blu.org (Subject line is ignored).