Penetration Testing mailing list archives
Re: Cracking WEP and WPA keys
From: "Matthias.Vallentin" <vallentin () net in tum de>
Date: Fri, 16 Dec 2005 18:54:42 +0100
On Fri, 2005-12-16 at 09:50 -0200, Demetrio Carrión wrote:
The key is not sent to the AP in the clear. The WEP authentication is a challenge-response protocol.
Actually, two authentication mechanisms are provided by WEP. You described the shared-key authentication wich almost extinct today. Open System authentication on the other hand is widely used, but the term 'authentication' is very far streched since the AP grants everyone access who asks. To reveal the keystream, one can xor ciphertext with the plaintext (both have been observed) and reinject packets with that new keystream. you already said that though ;). WEPWedgie [1] implements this attack quite well, but since most APs out there don't use shared authentication, other means must be found to obtain a valid keystream. An approach for open-system authentication networks is the so called 'Fragmentation Attack' which is based on layer 2 fragmentation of WEP frames. Since the first 8 encrypted bytes are predictable (LLC/SNAP), already 8 bytes of the keystream are known. The ICV needs 4 bytes, so 4 bytes can be send in a fragment. the fragment field is 2^16 bytes which leads to 4 * 2^16 = 64 bytes data! assume you have 28 bytes header infomation (LLC/SNAP + IP) you have 36 bytes to go... A. Bittau also provides a proof-of-concept tool called wesside [3] implemnting this attack. Regards, Matthias Vallentin [1] http://sourceforge.net/projects/wepwedgie/ [2] http://www.toorcon.org/2005/slides/abittau/slides.pdf [3] http://www.toorcon.org/2005/slides/abittau/abittau-fragattackinpractice.tgz ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- RE: Cracking WEP and WPA keys, (continued)
- RE: Cracking WEP and WPA keys cerealkilla (Dec 15)
- RE: Cracking WEP and WPA keys Sahir Hidayatullah (Dec 16)
- RE: Cracking WEP and WPA keys Josh Perrymon (Dec 13)
- Re: Cracking WEP and WPA keys pagvac (Dec 14)
- Radio Signal Pent test (RFID) Louie (Dec 14)
- Re: Radio Signal Pent test (RFID) Toufeeq Hussain (Dec 27)
- Re: Cracking WEP and WPA keys David M. Zendzian (Dec 14)
- Re: Cracking WEP and WPA keys Demetrio Carrión (Dec 16)
- RE: Cracking WEP and WPA keys Rui Pereira (WCG) (Dec 16)
- Re: Cracking WEP and WPA keys Cedric Blancher (Dec 16)
- Re: Cracking WEP and WPA keys Matthias.Vallentin (Dec 16)
- Radio Signal Pent test (RFID) Louie (Dec 14)
- Re: Cracking WEP and WPA keys Robert Baldi (Dec 14)
- Cracking WEP and WPA keys Eduardo Espina (Dec 14)
- Re: Cracking WEP and WPA keys Fabien Degouet (Dec 14)
- Re: Cracking WEP and WPA keys Robin Wood (Dec 15)
- Re: Cracking WEP and WPA keys Fabien Degouet (Dec 17)
- Re: Cracking WEP and WPA keys Fabien Degouet (Dec 14)
- RE: Cracking WEP and WPA keys Hamlesh Motah (Dec 14)
- RE: Cracking WEP and WPA keys Rapaille Maxime (Dec 17)
