WEP

(Wired Equivalency Protocol)

WEP is an encryption scheme, based on the RC-4 cipher, which is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV) is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text. WEP aims to provide security by encrypting the data over radio waves. The biggest problem is their inherent transmission of unique IV’s. These IV’s are gathered and “hacked” to reveal the WEP key. In the past, this method would take hours or days to gather and hack. However, with the latest generation of WEP cracking tools, this process can be accomplished in minutes or a few short hours. NOTE: A busy, near by network will produce more packets, thus, giving quicker results.

 

Wireless Advice

 

If you would like advice on how to secure your wireless network, I would recommend using WPA. If using the PSK (Pre-Shared Key) method, avoid building any password or pass-phrase from common, properly spelled words to avoid dictionary based hacks. Always use a combination of RANDOM numbers AND letters – utilizing BOTH caps AND lowercase. Personally, I memorized mine rather than writing them down. A minimum of 10 digits is recommended for any password.

Wired networks are the most secured kind. However, all networks are susceptible to exploits. The most secured network is one that is setup by an informed, seasoned professional.

More information and advice on networking can be found online, in books, and by talking with System Administrators, Tech Junkies, Gurus, and Miss Cleo from the psychic hotline. (insert Jamaican intonation) “What do ya wanna be askin’ me dahlin?”

 

 

How-2 Hack* WEP:

 

(Step #1.) Download back|track ISO. (SLAX based Live Modular Linux CD) – Choose open ISO using NERO BURNING ROM. This will prompt you to burn the CD.

(Step #2.) Read forums in such places as http://www.aircrack-ng.org. Be sure to research the proper hardware and software usage.

(Step #3.) Be prepared for a learning curve. If you stick with it, you’ll figure it out. There is a ton of information and how to guides online. I’m not interested in reposting it here.

(Step #4.) When in doubt, check the forum. I found all the answers to my questions without needing to ask.

(Step #5.) Have fun, but don’t break the law. Hack your own wireless network, just to see how effortlessly it can be done.

(Step #6.) Look into networking exploits after seeing success. Hint: http://ettercap.sourceforge.net/

*Disclaimer:   I do NOT endorse hacking your neighbor, local small business, or any other pathetically secured wireless network. If you have questions about hacking anything other than your own wireless network; find a forum. I’m not here to instruct, support, nor hold your hand in breaking the law.

NOTE: This site is a purely private homepage for the author. It has absolutely no associations with ANY hardware or software manufacturer, NOR retail store, service center or company. The opinions expressed on this site are not to be construed as anything other than the purely personal opinions and amusements of the author. That said, if you are offended or insulted by this site, don’t come back. I didn’t make it for you anyway. This site is brought to you via the First Amendment and someone with too much spare time on their hands.