Thursday, September 13, 2007

Cracking the Wired Equivalent Privacy (WEP) Key

Introduction:

The purpose of this project is to experiment with an IEEE 802.11 wireless network and learn how to exploit its security properties. In this project, you will learn how to use a variety of tools for surveying and sniffing wireless networks. The overall goal, however, is to crack the Wired Equivalent Protocol (WEP) protocol defined in the 802.11 standard. You have one month to complete this project. Don’t start your project at last minute. It does require some effort to complete!

The WEP protocol is crippled with numerous security flaws. Most of these
weaknesses are described in "Weaknesses in the Key Scheduling Algorithm of RC4" by
Scott Fluhrer, Itsik Mantin and Adi Shamir. The first person to implement this attack was
Adam Stubblefield.


Linux OS is highly recommended for this project, though Windows can do the same job as well. The best practice is to use a special security Linux distribution (such as WHAX, backtrack and etc) and a USB flash drive with at least 1G capacity. If you are not familiar with Linux, start your project as early as possible.


No comments: