Camp 2007 - 1.01
Chaos Communication Camp 2007
To infinity and beyond
Speakers | |
---|---|
Erik Tews |
Schedule | |
---|---|
Day | 4 |
Room | Shelter Bar |
Start time | 11:00 |
Duration | 01:00 |
Info | |
ID | 1943 |
Event type | Lecture |
Track | Hacking |
Language | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Breaking WEP in less than 60 Seconds
the next level
WEP is the currently most used protocol for securing 802.11 networks, also called wireless lans or wlans. Recently, a new attack on WEP, the PTW attack, was discovered, which allows an attacker to recover the secret key in less than 60 seconds in some cases.
WEP is the currently most used protocol for securing 802.11 networks, also called wireless lans or wlans. Recently, a new attack on WEP, the PTW attack, was discovered, which allows an attacker to recover the secret key in less than 60 seconds in some cases.
We will explain how this attack works and how it can be appied to a real network. Furthermore, a passive version of the PTW attack has now been implemented, which allows an attacker to attack a network without the risk of beeing detected by an wireless IDS system.
Additionally, we will present some other intresting attacks currently available in the aircrack-ng toolsuite. This includes the wesside-tool, which does wep-cracking fully automatically, and the easside-tool, which allows real-time-decryption of WEP-traffic without the secret key.