Return to the archive index
From: kayodeok <news4kayode@btopenworld.com> Date: Sat, 21 May 2005 18:28:51 +0100 Newsgroups: grc.linkfarm,grc.security.wireless How To Crack WEP - Part 2: Performing the Crack http://www.tomsnetworking.com/Sections-article120.php In Part 1 of How to Crack WEP, we showed the basic approach to WEP cracking, configured a practice target WLAN and configured both sniffing and attack computers. We also introduced the Auditor Security Collection and used Kismet to find in-range wireless LANs. In this article, we will describe how to use additional tools found on the Auditor CD to capture traffic and use it to crack a WEP key. We'll also describe how to use deauthentication and packet replay attacks to stimulate the generation of wireless traffic that is a key element of reducing the time it takes to perform a WEP key crack.
From Usenet Articles Archive (UAA)
Maintained by gwl
gwl At Home