Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Posted on
August 1, 2006, 4:51 pm
rate this thread
- Sebastian Gottschalk
August 1, 2006, 6:20 pm
Re: WEP authentication, why WEP authentication scheme is flawed and how it can be attacked
Google it up. WEP is crytographically weak and there are a number of
different rather efficient attacks for it. Packet reinject to gather
enough IV's, FHS or any of a handful of cryptographic attacks against
em, and the WEP key is yours.
Detail gathering is left as an exercise for Johnny.
- » ssh on command line: force using a group size (prime size) of 1024 (and no...
- — The site's Newest Thread. Posted in » Secure Shell Forum