Introduction
Millions of wireless access points are spread across the US and the world. About 70% percent of these access points are unprotected - wide open to access by anyone who happens to drive by. The other 30% are protected by WEP (Wired Equivalent Privacy) and a small handful are protected by the new WPA (Wi-Fi Protected Access) standard.
Figure 1: FBI Computer Scientist James C. Smith (left) and
FBI Special Agent Geoff Bickers (right)
At a recent ISSA (Information Systems Security Association) meeting in Los Angeles, a team of FBI agents demonstrated current WEP-cracking techniques and broke a 128 bit WEP key in about three minutes. Special Agent Geoff Bickers ran the Powerpoint presentation and explained the attack, while the other agents (who did not want to be named or photographed) did the dirty work of sniffing wireless traffic and breaking the WEP keys.
This article will be a general overview of the procedures used by the FBI team. A future article will give step-by-step instructions on how to replicate the attack.

Support Us!
Most Read This Week
...
Over In The Forums
Don't Miss These
-
First Peek At Wi-Fi 6: ASUS RT-AX88U & NETGEAR RAX80
Updated - Our first look at the performance of NETGEAR's RAX80 and ASUS' RT-AX88U shows little benefit functioning as AC routers.
-
5 Things To Know Before You Buy A Draft 11ax Router
Updated: The first draft 11ax routers are almost here. Take a little time to know what you might be buying into.
-
160 MHz Wi-Fi Channels: Friend or Foe?
Updated - 160 MHz channel bandwidth is an essential feature of 802.11ax. We take a look at whether it means trouble for your 11ac network.
-
Wi-Fi Roaming Secrets Revealed
Ever wonder what happens behind the scenes when Wi-Fi devices roam, or more likely don't? We'll show you why the "seamless" roaming Wi-Fi gear makers promise is still as elusive as a Yeti.
- 1
- 2
- 3