{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Lecture 8 - wireless Part 3

Lecture 8 - wireless Part 3 - Understanding and Attacking...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
© 2010 by Foundstone - All rights reserved. Duplication of this material is expressly prohibited VIII-1 http://www.foundstone.com Ultimate Hacking Wireless Understanding and Attacking WEP www.foundstone.com Copyright © 2010 McAfee, Inc. Understanding and Attacking WEP 8-2 Overview Understanding WEP Encryption Attacking WEP www.foundstone.com Copyright © 2010 McAfee, Inc. Understanding and Attacking WEP 8-3 Understanding WEP Encryption History Of WEP www.foundstone.com Copyright © 2010 McAfee, Inc. Understanding and Attacking WEP 8-4 Understanding WEP Encryption WEP head2right No longer considered a viable method of securing 802.11 frames head2right Protects information transmitted via the wireless network by encrypting the data within the 802.11 frame head2right The client uses the initialization vector (IV) stored within the frame header and the WEP key to decrypt the data www.foundstone.com Copyright © 2010 McAfee, Inc. Understanding and Attacking WEP 8-5 WEP Encryption Process The CRC-32 ICV head2right A 4 byte CRC-32 Integrity Check Value (ICV) is computed for the data payload of the packet and appended to it The UNIQUE seed head2right The shared secret “key” (k) is static head2right A 24-bit Initialization Vector (IV) is concatenated with the key (k) to form a “unique” seed Plaintext Message (M) ICV [s(M)] Shared Key ( k ) IV www.foundstone.com Copyright © 2010 McAfee, Inc. Understanding and Attacking WEP 8-6 WEP Encryption Process The Keystream head2right
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}