Wireless bandit ..

A weblog about wardriving in Toronto, here I read about:

How WEP was broken

A paper describing how WEP was broken for under $100 by some summer interns at AT&T labs… Must’ve been quite a summer project. I wonder if they were hired to do something like this…

Summary: If you sniff about 5M-7M wireless packets on a WEP encrypted channel, you can deduce the WEP key quite easily. Look for AirSnort for the implementation of this attack.

Conclusion: WEP is broken, so use it at your own risk. MAC Address filtering is probably a better way to go, but even that is not terribly secure as many wireless cards can have their MAC address changed on demand.

:: Wireless Bandit RSS/XML News Syndicated ::

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.