Tuesday, September 18, 2007

WiMAX Is 3G

WiMAX has a reason to celebrate. The International Telecommunications Union has just approved the non-cellular technology as part of a 3G standard. This means that operators with 3G spectrum in their 2.5 GHz bands globally can use WiMAX to build out a spectrum.

The last interface added was back in 1999 when ITU added IMT-2000 as it established the original technologies. IMT-2000 and five other cellular standards had to be used in the 3G standard, now the door is open to WiMAX.

But all is not rosey for WiMAX, the debate between technologies is far from over.

Thursday, September 13, 2007

Cracking the Wired Equivalent Privacy (WEP) Key

Introduction:

The purpose of this project is to experiment with an IEEE 802.11 wireless network and learn how to exploit its security properties. In this project, you will learn how to use a variety of tools for surveying and sniffing wireless networks. The overall goal, however, is to crack the Wired Equivalent Protocol (WEP) protocol defined in the 802.11 standard. You have one month to complete this project. Don’t start your project at last minute. It does require some effort to complete!

The WEP protocol is crippled with numerous security flaws. Most of these
weaknesses are described in "Weaknesses in the Key Scheduling Algorithm of RC4" by
Scott Fluhrer, Itsik Mantin and Adi Shamir. The first person to implement this attack was
Adam Stubblefield.


Linux OS is highly recommended for this project, though Windows can do the same job as well. The best practice is to use a special security Linux distribution (such as WHAX, backtrack and etc) and a USB flash drive with at least 1G capacity. If you are not familiar with Linux, start your project as early as possible.