# Thread: Why can we crack WEP ?

1. ## Why can we crack WEP ?

I got WEP key from any access point! But, I'm very curiously! I have a question "Why can we crack WEP by capturing a large number of IVs?"

2. simple answer, because of the weaknesses in the algorithm.

If you want more, then please rephrase your question to give us as much info as possible. From what you have put it is impossible to see what you are actually asking for.

3. Originally Posted by balding_parrot
simple answer, because of the weaknesses in the algorithm.

If you want more, then please rephrase your question to give us as much info as possible. From what you have put it is impossible to see what you are actually asking for.

The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me !

4. Originally Posted by cold_blood_boy178

The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me !

5. Originally Posted by cold_blood_boy178

The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me !
Because someone fscked up in writing the code, that's why.

6. Originally Posted by cold_blood_boy178

The purpose of my question is "What are the weaknesses in the algorithm?", I read some document. I know IVs has weaknesses, but I cann't understand why IVs has weakness. These documents only write "weakness in IVs", but don't write the reason. I want to know the reason, please explain for me !
In lay mans terms. Every time a iv is set out it contains a small piece of the key used for verification. If you capture enough ivs they go together in a mathamatical algorithim unique to each mac address. The program aircrack can DO THE MATH.

7. Originally Posted by purehate
In lay mans terms. Every time a iv is set out it contains a small piece of the key used for verification. If you capture enough ivs they go together in a mathamatical algorithim unique to each mac address. The program aircrack can DO THE MATH.
Do you have algorithm create IVs, CRC of WEP ?

my YIM: the_overtime_love_story@yahoo.com.vn

8. Originally Posted by cold_blood_boy178
Do you have algorithm create IVs, CRC of WEP ?

my YIM: the_overtime_love_story@yahoo.com.vn
Why would WE have it ? How would WE get it ? think about it for more than a nano second.

If we had the algorithm then we would only need to receive a couple of packets to be able to reverse the key. Instead we need thousands to brute force the key.

9. Originally Posted by cold_blood_boy178
"Why can we crack WEP by capturing a large number of IVs?"
BECAUSE WE SIMPLY CAN !

10. Originally Posted by cold_blood_boy178
Do you have algorithm create IVs, CRC of WEP ?

my YIM: the_overtime_love_story@yahoo.com.vn
Once again, people fail to follow simple guidelines...

#### Posting Permissions

• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts
•