WEP authentication, why WEP authentication scheme is flawed and how it can be attacked

Discussion in 'Wireless Internet' started by Johnny, Aug 1, 2006.

  1. Johnny

    Johnny Guest

    Can someone please explain to me:

    WEP authentication?

    Why WEP authentication scheme is flawed?

    How it can be attacked?


    Thank you,

    Johnny.
     
    Johnny, Aug 1, 2006
    #1
    1. Advertisements

    1. Advertisements

  2. Johnny

    Johnny Guest

    Johnny, Aug 2, 2006
    #3
  3. You mean exactly how the various WEP exploit tools work? I'm not
    interested in expounding on that. Do your own research. There are
    quite a few links, references, and tools listed at the bottom of:
    http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy

    There's also a huge mass of wireless security references and URL's at:
    http://www.drizzle.com/~aboba/IEEE/
     
    Jeff Liebermann, Aug 2, 2006
    #4
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.