Breaking WEP in less than 60 Seconds

From Chaos Communication Camp 2007

Jump to: navigation, search

Breaking WEP in less than 60 Seconds

Speakers
Erik Tews
Schedule
Day {{{day}}}
Room Shelter Bar
Start time 11:00
Duration 01:00
Info
ID 1943
Event type Lecture
Track Hacking
Language English


WEP is the currently most used protocol for securing 802.11 networks, also called wireless lans or wlans. Recently, a new attack on WEP, the PTW attack, was discovered, which allows an attacker to recover the secret key in less than 60 seconds in some cases.

WEP is the currently most used protocol for securing 802.11 networks, also called wireless lans or wlans. Recently, a new attack on WEP, the PTW attack, was discovered, which allows an attacker to recover the secret key in less than 60 seconds in some cases.

We will explain how this attack works and how it can be appied to a real network. Furthermore, a passive version of the PTW attack has now been implemented, which allows an attacker to attack a network without the risk of beeing detected by an wireless IDS system.

Additionally, we will present some other intresting attacks currently available in the aircrack-ng toolsuite. This includes the wesside-tool, which does wep-cracking fully automatically, and the easside-tool, which allows real-time-decryption of WEP-traffic without the secret key.

[edit] Links

[edit] Recordings

  • Please add here as soon as they are available
Personal tools