Results 1 to 10 of 10

Thread: Why can we crack WEP ?

Hybrid View

  1. #1
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    3

    Default Why can we crack WEP ?

    I got WEP key from any access point! But, I'm very curiously! I have a question "Why can we crack WEP by capturing a large number of IVs?"
    Please, explain for me !

  2. #2
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    simple answer, because of the weaknesses in the algorithm.

    If you want more, then please rephrase your question to give us as much info as possible. From what you have put it is impossible to see what you are actually asking for.

  3. #3
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    3

    Default

    Quote Originally Posted by balding_parrot View Post
    simple answer, because of the weaknesses in the algorithm.

    If you want more, then please rephrase your question to give us as much info as possible. From what you have put it is impossible to see what you are actually asking for.
    Uhm, thanks to your reply !

    The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me !

  4. #4
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by cold_blood_boy178 View Post
    Uhm, thanks to your reply !

    The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me !
    Google, Google, Google, and then more Google. Seriously. It's all out there.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  5. #5
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by cold_blood_boy178 View Post
    Uhm, thanks to your reply !

    The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me !
    Because someone fscked up in writing the code, that's why.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  6. #6
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    Quote Originally Posted by cold_blood_boy178 View Post
    Uhm, thanks to your reply !

    The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me !
    In lay mans terms. Every time a iv is set out it contains a small piece of the key used for verification. If you capture enough ivs they go together in a mathamatical algorithim unique to each mac address. The program aircrack can DO THE MATH.

  7. #7
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    3

    Default

    Quote Originally Posted by purehate View Post
    In lay mans terms. Every time a iv is set out it contains a small piece of the key used for verification. If you capture enough ivs they go together in a mathamatical algorithim unique to each mac address. The program aircrack can DO THE MATH.
    Do you have algorithm create IVs, CRC of WEP ?

    Please send for me!
    my YIM: the_overtime_love_story@yahoo.com.vn

  8. #8
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Quote Originally Posted by cold_blood_boy178 View Post
    Do you have algorithm create IVs, CRC of WEP ?

    Please send for me!
    my YIM: the_overtime_love_story@yahoo.com.vn
    Why would WE have it ? How would WE get it ? think about it for more than a nano second.

    If we had the algorithm then we would only need to receive a couple of packets to be able to reverse the key. Instead we need thousands to brute force the key.

  9. #9
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by cold_blood_boy178 View Post
    Do you have algorithm create IVs, CRC of WEP ?

    Please send for me!
    my YIM: the_overtime_love_story@yahoo.com.vn
    Once again, people fail to follow simple guidelines...
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  10. #10
    Member hawaii67's Avatar
    Join Date
    Feb 2006
    Posts
    318

    Default

    Quote Originally Posted by cold_blood_boy178 View Post
    "Why can we crack WEP by capturing a large number of IVs?"
    BECAUSE WE SIMPLY CAN !
    Don't eat yellow snow :rolleyes:

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •