Wireless Infrastructure

01:25 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

FBI Teaches Lesson In How To Break Into Wi-Fi Networks

FBI agents at a recent security conference demonstrated how they could break into a wireless network. They did it to prove how easy it was, and describe measures that users

Millions of wireless access points are spread across the US and the world. About 70% percent of these access points are unprotected — wide open to access by anyone who happens to drive by. The other 30% are protected by WEP (Wired Equivalent Privacy) and a small handful are protected by the new WPA (Wi-Fi Protected Access) standard.

At a recent ISSA (Information Systems Security Association) meeting in Los Angeles, a team of FBI agents demonstrated current WEP-cracking techniques and broke a 128 bit WEP key in about three minutes. Special Agent Geoff Bickers ran the Powerpoint presentation and explained the attack, while the other agents (who did not want to be named or photographed) did the dirty work of sniffing wireless traffic and breaking the WEP keys.

This article will be a general overview of the procedures used by the FBI team. A future article will give step-by-step instructions on how to replicate the attack.

WEP Cracking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Hot Topics
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed