Prj2-doc - INTRODUCTION The only method that had been...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
INTRODUCTION The only method that had been defined for security by IEEE 802.11 was WEP (Wired Equivalent Privacy). This project is mainly aimed at cracking the WEP. The WEP method attaches a 3-byte Initialization Vector (IV) to every packet that is generated. This IV is based on the pre-shared key that the authenticated clients know. So, when we collect enough packets with this IV, a brute force approach can be used to crack the shared WEP key. The different types of attack that can be made are: Passive attacks to decrypt traffic based on statistical analysis Active attack to inject new packets from unauthorized stations Active attacks to decrypt the file based on tricking the access point Dictionary attack Flaws in WEP algorithm WEP uses the RC4 encryption algorithm. This stream cipher expands a short key into an infinite pseudo-random key stream. The sender XORs this key stream with the plaintext to produce the cipher text. The receiver has the same key which is used to generate the identical key stream. XORing the key stream with the cipher text yields the original plaintext. So, if an eavesdropper intercepts two cipher texts encrypted with the same key, the XOR of the two plain texts can be obtained. Once one of the plain texts is known, then it is easy to recover the other plain text. We crack the WEP key of 40-bit length in both Infrastructure and Ad-Hoc mode. In the Infrastructure mode, the access point of the local internet connection is the target. In this case, only the attacker captures data to and from the access point passively. Hardware details Laptop that is used as the Access Point (Target) Manufacturer: Hewlett-Packard Model: HP G60 Notebook Processor: AMD Turion Dual-Core RM-75 2.20GHz RAM: 3GB OS: Windows Vista home premium
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
System type: 32-bit OS Network adapter: Atheros AR5007 802.11b/g WiFi Adapter Driver version: MAC Address: 00-26-5E-4D-55-0A Laptop that is used as the client Manufacturer: Acer Processor: Intel Celeron 2GHz RAM: 1GB OS: Vista Home Basic System Type: 32 bit OS MAC: 00-1F-3A-79-F9-97 Network Adapter: Atheros AR5007EG Wireless Network Adapter Laptop that is used as the attacker Manufacturer: Asus Model: Asus U 81 Notebook Processor: Intel Core 2 Duo T6500 @ 2.10 GHz 2.10 GHz RAM: 4 GB System Type: 32 Bit OS
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 12

Prj2-doc - INTRODUCTION The only method that had been...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online