# Why can we crack WEP ?

• 07-25-2007, 12:51 PM
cold_blood_boy178
Why can we crack WEP ?
I got WEP key from any access point! But, I'm very curiously! I have a question "Why can we crack WEP by capturing a large number of IVs?"
• 07-25-2007, 01:27 PM
balding_parrot
simple answer, because of the weaknesses in the algorithm.

If you want more, then please rephrase your question to give us as much info as possible. From what you have put it is impossible to see what you are actually asking for.
• 07-25-2007, 01:42 PM
cold_blood_boy178
Quote:

Originally Posted by balding_parrot
simple answer, because of the weaknesses in the algorithm.

If you want more, then please rephrase your question to give us as much info as possible. From what you have put it is impossible to see what you are actually asking for.

The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me ! :)
• 07-25-2007, 02:15 PM
theprez98
Quote:

Originally Posted by cold_blood_boy178

The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me ! :)

• 07-25-2007, 02:49 PM
streaker69
Quote:

Originally Posted by cold_blood_boy178

The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me ! :)

Because someone fscked up in writing the code, that's why.
• 07-25-2007, 05:35 PM
purehate
Quote:

Originally Posted by cold_blood_boy178

The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me ! :)

In lay mans terms. Every time a iv is set out it contains a small piece of the key used for verification. If you capture enough ivs they go together in a mathamatical algorithim unique to each mac address. The program aircrack can DO THE MATH.:D
• 07-26-2007, 10:02 AM
cold_blood_boy178
Quote:

Originally Posted by purehate
In lay mans terms. Every time a iv is set out it contains a small piece of the key used for verification. If you capture enough ivs they go together in a mathamatical algorithim unique to each mac address. The program aircrack can DO THE MATH.:D

Do you have algorithm create IVs, CRC of WEP ?

my YIM: the_overtime_love_story@yahoo.com.vn
• 07-26-2007, 10:14 AM
balding_parrot
Quote:

Originally Posted by cold_blood_boy178
Do you have algorithm create IVs, CRC of WEP ?

my YIM: the_overtime_love_story@yahoo.com.vn

Why would WE have it ? How would WE get it ? think about it for more than a nano second.

If we had the algorithm then we would only need to receive a couple of packets to be able to reverse the key. Instead we need thousands to brute force the key.
• 07-26-2007, 12:55 PM
hawaii67
Quote:

Originally Posted by cold_blood_boy178
"Why can we crack WEP by capturing a large number of IVs?"

BECAUSE WE SIMPLY CAN ! :cool:
• 07-26-2007, 02:19 PM
theprez98
Quote:

Originally Posted by cold_blood_boy178
Do you have algorithm create IVs, CRC of WEP ?