1 of 16

Slide Notes

DownloadGo Live

WEP Vulnerabilities

Published on Dec 01, 2015

No Description

PRESENTATION OUTLINE

WEP Vulnerabilities

Elias and Shane Paper Joint
Photo by MattysFlicks

Wired Equivalent Privacy

  • WEP has been around for a long time
  • Provides wireless security similar to a wired connection
  • It can still be used today but its not recommended

64 Bit WEP Encryption

  • WEP uses two steps of encryption
  • A stream cipher called RC4 for confidentiality and CRC32 checksum for integrity
  • A 64 bit WEP encryption is standard

Encryption explained more

  • 10(Hex characters and numbers) X 4(bits) = 40 bits of encryption + 24 (Initialization vector) = 64 bit WEP Encryption method
Photo by elsamuko

Example of 64 WEP encryption

  • F91EDA21B5
  • Encrypted message could mean Hello

Public keys and private keys

  • public keys encrypts data to a non readable form,
  • private key decrypts an encryption so it can be converted back to clear text
Photo by RobotSkirts

WEP Authentication

  • Two types:
  • Open Systems
  • Shared key authentication

Open Systems

  • Means anyone don't have to provide authentication to the access point during authentication

Shared Key Authentication

  • **(There will be a diagram here)**

Initialization Vector

  • RC4 is a stream cipher the same traffic key must never be used twice
  • The IV's purpose is to prevent any repetition of the same traffic key being utilized in packets
  • Because so little IV packets are being used statistically speaking
  • there is a 50 percent chance that the same packet will be used after 5000 packets

Performs

  • This attack can be used by personal cpu's off the shelf hardware, and freely available software such as aircrack-ng to crack any WEP keys in minutes

Aircrack-ng

  • Packet sniffer for 802.11
  • cracks WEP and WPA keys using dictionary attacks
  • compatible with wireless network interface cntroller that supports raw maonitoring mode
  • runs under linux and windows

RC4

  • Rivest Cipher- Ron's Code
  • RC4 is a stream cipher
  • used in popular internet protocols
  • vulnerable when key stream is not discarded
  • mozzilla and Microsoft recommends disabling RC4 when possible

Remedy

  • THere has been different alternatives when it comes to wireless security
  • Recommendations include WPA2 or WPA

GREAT SCOTT!

  • Any Questions?
Photo by lirontocker

Satisfied?

Photo by torbakhopper