Briefly describe the process involved in cracking WEP.






Briefly describe the process involved in cracking WEP...

Answer / chaitanya

To efficiently crack a WEP key, you first need to obtain an Address Resolution Protocol (ARP) packet from the access point you want to attack. You can obtain this packet using a tool such as Void11 (www.wlsec.net/void11) to send deauthentication packets to the clients associated with that access point. When the clients reassociate to the access point, ARP packets will be generated and can be captured. After you have captured a valid ARP packet, you can use a tool such as Aireplay, a part of the Aircrack suite (http://freshmeat.net/projects/aircrack/), to inject the ARP packet back into the network. This injection process will cause a large number

of initialization vectors to be generated. You can capture this traffic with any pcap format sniffer. Ethereal, Airodump, and Kismet all support pcap format. After you have captured between 500,000 and 1 million unique initialization vectors, you can then crack the WEP key using Aircrack or other, similar tools. Most of these tools are available for free on the Internet.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer




More WiFi Security Interview Questions

Should an impostor capture the authenticator on the network and, without decrypting it, sends it as is to the captive gateway, could he or she obtain illegal access to the network?

1 Answers  


Why should not the user close the popup control window which appears after the authentication with the CaptivePortal?

1 Answers  


how can i see the security information of my wifi provider in my command prompt?

0 Answers   Cap Gemini,


What is the difference between active and passive WLAN detection?

1 Answers  


What is the minimum passphrase length that should be used for WPA-PSK?

1 Answers  






What is the difference between the HostAP drivers and the wlan-ng drivers for Linux?

1 Answers  


What is the primary difference between 802.11g and 802.11a?

1 Answers  


Our organization doesn’t have a wireless network, so is it even important for our security engineers to understand wireless security?

1 Answers  


Captive gateways can work in Routed Mode or in Bridged Mode. What does that mean?

1 Answers  


How many types of Extensible Authentication Protocols (EAPs) are supported by WPA/WPA2 and what are they?

1 Answers  


I have a Wi-Fi network and would like to protect it from unauthorized access. It is better to use a RADIUS server that allows me to have 802.1x authentication and protection with WPA or WPA2 or use a Captive Portal that authenticates access via web login?

1 Answers  


What tools do you use to WarDrive?

1 Answers  






Categories