|
WEP (Wired
Equivalency Protocol) WEP is an encryption scheme, based on the
RC-4 cipher, which is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames
as it leaves the access point or client adapter and the scrambled message is
then decrypted by the receiver. Both sides must have the same WEP key, which
is usually a total of 64 or 128 bits long. A semi-random 24 bit number called
an Initialization Vector (IV) is part of the key, so a 64 bit WEP key
actually contains only 40 bits of "strong" encryption while a 128
bit key has 104. The IV is placed in encrypted frame's header, and is
transmitted in plain text. WEP aims to provide security by encrypting the
data over radio waves. The biggest problem is their inherent transmission of
unique IV’s. These IV’s are gathered and “hacked” to reveal the WEP key. In
the past, this method would take hours or days to gather and hack. However,
with the latest generation of WEP cracking tools, this process can be
accomplished in minutes or a few
short hours. NOTE: A busy, near by network will produce more packets, thus,
giving quicker results. |
|
Wireless Advice If you would like advice on how to secure
your wireless network, I would recommend using WPA. If using the PSK
(Pre-Shared Key) method, avoid building any password or pass-phrase from
common, properly spelled words to avoid dictionary based hacks. Always use a
combination of RANDOM numbers AND letters – utilizing BOTH caps AND lowercase. Personally, I memorized mine rather than writing
them down. A minimum of 10 digits is recommended for any password. Wired networks are the most secured kind.
However, all networks are susceptible to exploits. The most secured network
is one that is setup by an informed, seasoned professional. More information and
advice on networking can be found online, in books, and by talking with
System Administrators, Tech Junkies, Gurus, and Miss Cleo from the psychic
hotline. (insert Jamaican intonation) “What do ya wanna be askin’ me dahlin?” |
|
How-2 Hack* WEP: (Step #1.) Download back|track
ISO. (SLAX based Live Modular Linux CD) – Choose open ISO using NERO BURNING
ROM. This will prompt you to burn the CD. (Step #2.) Read forums in such places as http://www.aircrack-ng.org. Be sure to research the proper hardware and
software usage. (Step #3.) Be
prepared for a learning curve. If you stick with it, you’ll figure it out.
There is a ton of information and how to guides online. I’m not interested in
reposting it here. (Step #4.) When in doubt, check the forum. I found all the
answers to my questions without needing to ask. (Step #5.) Have fun, but don’t break the law. Hack your own
wireless network, just to see how effortlessly it can be done. (Step #6.) Look into networking exploits after seeing
success. Hint: http://ettercap.sourceforge.net/ |
*Disclaimer: I do NOT
endorse hacking your neighbor, local small business, or any other pathetically
secured wireless network. If you have questions about hacking anything other than
your own wireless network; find a forum. I’m not here to instruct, support, nor
hold your hand in breaking the law.
NOTE: This site is a purely private homepage
for the author. It has absolutely no associations with ANY hardware or software
manufacturer, NOR retail store, service center or company. The opinions
expressed on this site are not to be construed as anything other than the
purely personal opinions and amusements of the author. That said, if you are
offended or insulted by this site, don’t come back. I didn’t make it for you
anyway. This site is brought to you via the First Amendment and someone with
too much spare time on their hands.