Главная
Study mode:
on
1
Introduction
2
Talk overview
3
Why Perform Dictionary attacks on WEP?
4
Wired Equivalent Privacy
5
WEP Encryption
6
WEP Authentication
7
128-bit Variant
8
WEP Keying
9
Key Entry Example
10
64-bit key Generator
11
64-bit Generator Flawed!
12
ASCI Mapping Reduces Entropy
13
PRNG Use Reduces Entropy
14
Entropy of 64-bit Generator is 21-bits
15
128-bit Generator
16
Designed and implemented a WEP Cracker
17
Structure of WEP Cracker
18
Packet Collector
19
Making Guesses
20
Mapping Guesses to Keys
21
Key Verification
22
Results
23
Brute Force of Keys
24
Implications
25
Related work - Bad News
26
That's All Folks...
Description:
Explore the vulnerabilities of Wired Equivalent Privacy (WEP) encryption in this 46-minute Black Hat USA 2001 conference talk by Tim Newsham. Delve into the reasons for performing dictionary attacks on WEP and understand the intricacies of WEP encryption and authentication. Examine the flaws in 64-bit and 128-bit key generators, including reduced entropy due to ASCII mapping and PRNG use. Learn about the structure and implementation of a WEP cracker, including packet collection, key guessing, and verification techniques. Discover the implications of these vulnerabilities and related work in the field. Gain valuable insights into the weaknesses of early wireless security protocols and their impact on network security.

Cracking WEP Keys

Black Hat
Add to list