In the first issue (Jan-feb 2003) of the IEEE Security & Privacy magazine http://csdl.computer.org/comp/mags/sp/2003/01/j1toc.htm
Nick Petroni and Will Arbaugh provide a quite detailed description of
an active attack against WEP that provides full network access to the wireless LAN (both encryption and decryption) without knowledge of
the secret key within a few hours. The attack takes advantage of the
use of CRC-32 for packet integrity checks and the availability of
known or easily predictable plainterxt in common network protocols like
DHCP and ICMP.
"The Dangers of Mitigating Security Design Flaws: A Wireless Case Study" Nick L. Petroni Jr. and William A. Arbaugh IEEE Security & Privacy magazine, Jan-Feb 2003, pp 28-36
I dont know of any publicly available implementation of this attack but it is certainly a good starting point for those willing to code it :)
-ivan
--- Perscriptio in manibus tabellariorum est Noli me vocare, ego te vocabo
Ivan Arce CTO CORE SECURITY TECHNOLOGIES
46 Farnsworth Street Boston, MA 02210 Ph: 617-399-6980 Fax: 617-399-6987 [EMAIL PROTECTED] www.coresecurity.com
PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836 B25D 207B E78E 2AD1 F65A
R. DuFresne wrote:
It's been done. But, I think someone erred earlier in the ammount of traffic one needs to capture to accomplish this. I recall it being someplace between only 5 and 6 megs of traffic, perhaps 10 if one wished to make sure, but, I will enjoy any corrections to my recollections.
Thanks,
Ron DuFresne
On Fri, 18 Jul 2003, Calderone, Denis wrote:
A side question for the group on this topic,
Has anybody successfully used WEPcrack or Airsnort to crack a 128bit key? I've never tried.
thanks
Denis Calderone
--------------------------------------------------------------------------- ----------------------------------------------------------------------------
