About 254,000 results
Open links in new tab
  1. cryptography - How does WEP wireless security work?

    Jul 6, 2015 · For 64-bit WEP, the key is made with 24 bits from the IV and 40 bits from the WEP key, which results in a 5-letter ascii password or 10 hexadecimal characters. For 128-bit WEP, …

  2. How to find a wep key inside a pcap file with only 2 IV?

    Nov 4, 2017 · In order to break WEP you need to catch 2 packets with the same key and reused IVs. The number of packets in order to break the key depends on the length of the IV, but you …

  3. Why it does not matter whether you type HEX or ASCII as WEP …

    A 64-bit WEP key is usually entered as a string of 10 hexadecimal (base 16) characters (0-9 and A-F). Each character represents four bits, 10 digits of four bits each gives 40 bits; adding the …

  4. RC4 decryption with WEP - Information Security Stack Exchange

    Sep 8, 2024 · I just want to make sure what I know is correct about why WEP isnt secure. When a client wants to send data to AP using WEP, the WEP key (which is the password the user …

  5. wireless - How to speed up brute forcing of finding a WEP key …

    Aug 19, 2019 · The number of required IVs depends on the WEP key length, and it also depends on your luck. Usually, 40-bit WEP (64 bit key) can be cracked with 300,000 IVs, and 104-bit …

  6. Regarding number of packets needed to crack WEP

    Aug 23, 2016 · One of the major weaknesses of WEP is a short 24-bit IV, which means that only 224 packets are needed to exhaust all IVs. 224 translates to about 16.5 million IVs (or packets …

  7. How can I decrypt traffic on a WEP encrypted network?

    If you are not connected to the WEP network, but want to find the WEP key anyway, there are tools to do this by eavesdropping on a bunch of traffic. I recommend aircrack-ng (see this …

  8. What are weak IVs? Can we somehow stop or slow down WEP …

    Oct 25, 2016 · More specifically, an IV is weak (in the sense of the FMS attack) if it is of some particular kind such as, for example, A+3::ff:X, where A is the byte of the key to be found, ff is …

  9. wireshark - Data sniffing on a WEP 128-bit encryption

    Sep 28, 2017 · My setup: I have set up my very own WEP WiFi network (intentionally made vulnerable by setting up WEP encryption). I have also set up a microcontroller (NodeMCU, in …

  10. How does WiFi password cracking work? - Information Security …

    Aug 26, 2013 · The initialization vector in WEP is a 24-bit field, which is sent in the cleartext part of a message. Such a small space of initialization vectors guarantees the reuse of the same …