Breaking 104 bit WEP in less than 60 seconds

We demonstrate an active attack on the WEP protocol that is able to
recover a 104-bit WEP key using less than 40.000 frames with a success
probability of 50%. In order to succeed in 95% of all cases, 85.000
packets are needed. The IV of these packets can be randomly chosen.
This is an improvement in the number of required frames by more than an
order of magnitude over the best known key-recovery attacks for WEP. On
a IEEE 802.11g network, the number of frames required can be obtained
by re-injection in less than a minute. The required computational
effort is approximately 2^20 RC4 key setups, which on current desktop
and laptop CPUs in negligible.

Good paper (PDF) from Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin.  It ridiculous how many people still user WEP.


Author: Xavier Ashe

Entrepreneur, Infosec Executive, CISSP, CISM, Ironman triathlete, traveler, UU, paleo, father of 8, goyishe, gamer, & geek.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s