There are numerous tools that afford someone with enough time on his hands the opportunity to try cracking your WEP-enabled Access Point. WEP is now considered to be a very weak, largely ineffective security tool for wireless LANs. Some examples of cracking tools are:
AirSnort is a wireless LAN tool which cracks encryption keys on 802.11b WEP networks. It operates by passively monitoring transmissions and computing the WEP encryption key when enough packets have been gathered.
BSD-Airtools is a complete toolset for wireless 802.11b auditing. It contains a cracking application called dweputils (as well as kernel patches for NetBSD, OpenBSD, and FreeBSD). It also contains a detection application similar to Netstumbler that can be used to detect wireless access points and connected nodes, view signal to noise graphs, and interactively scroll through scanned Access Points and view statistics for each.
WEPCrack is a tool that cracks 802.11 WEP encryption keys by exploiting the weaknesses of RC4 key scheduling.
WepAttack is a WLAN open source Linux tool for breaking 802.11 WEP keys. This tool is based on an active dictionary attack that tests millions of words to find the right key. Only one packet is required to start an attack on WEP.
WEPWedgie is a tool for determining 802.11 WEP keystreams and injecting traffic with known keystreams. The toolkit also includes logic for firewall rule mapping, pingscanning, and portscanning via the injection channel and a cellular modem.
last modified: 2005-12-24 09:14:22