Return to the archive index

How To Crack WEP - Part 2

From:  kayodeok <news4kayode@btopenworld.com>
Date:  Sat, 21 May 2005 18:28:51 +0100
Newsgroups:  grc.linkfarm,grc.security.wireless

 How To Crack WEP - Part 2: Performing the Crack

 http://www.tomsnetworking.com/Sections-article120.php

 In Part 1 of How to Crack WEP, we showed the basic approach to WEP cracking,
 configured a practice target WLAN and configured both sniffing and attack
 computers. We also introduced the Auditor Security Collection and used
 Kismet to find in-range wireless LANs.

 In this article, we will describe how to use additional tools found on the
 Auditor CD to capture traffic and use it to crack a WEP key. We'll also
 describe how to use deauthentication and packet replay attacks to stimulate
 the generation of wireless traffic that is a key element of reducing the
 time it takes to perform a WEP key crack.

From Usenet Articles Archive (UAA)
Maintained by gwl
gwl At Home