Skip to main content

WEP destroyed by new client hack

posted onOctober 23, 2007
by hitbsecnews

It was cracked long ago, but hacks for the discredited WEP wireless security protocol still keep coming. The latest one to be uncovered is the work of AirTight Networks’ researchers Vivek Ramachandran and MD Sohail Ahmad, and was demonstrated at last weekend’s Toorcon9 conference.

Aided by flaws in the Windows Wi-Fi stack, the new attack involved coaxing an isolated Windows laptop into sending back ARP packets in response to a barrage of the same from the attacking machine, from which the WEP (wired equivalency protocol) key can be recovered.

Unlike past attacks, which involved sniffing the encryption key used by WEP using traffic to and from the access point (AP), the new attack involves only the laptop client, and can be done even if the laptop is nowhere near an AP.

Source

Tags

Wireless

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th