Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Wireless Features

Introduction

Millions of wireless access points are spread across the US and the world. About 70% percent of these access points are unprotected - wide open to access by anyone who happens to drive by. The other 30% are protected by WEP (Wired Equivalent Privacy) and a small handful are protected by the new WPA (Wi-Fi Protected Access) standard.

FBI Computer Scientist James C. Smith (left) and FBI Special Agent Geoff Bickers (right)

Figure 1: FBI Computer Scientist James C. Smith (left) and
FBI Special Agent Geoff Bickers (right)

At a recent ISSA (Information Systems Security Association) meeting in Los Angeles, a team of FBI agents demonstrated current WEP-cracking techniques and broke a 128 bit WEP key in about three minutes. Special Agent Geoff Bickers ran the Powerpoint presentation and explained the attack, while the other agents (who did not want to be named or photographed) did the dirty work of sniffing wireless traffic and breaking the WEP keys.

This article will be a general overview of the procedures used by the FBI team. A future article will give step-by-step instructions on how to replicate the attack.

More Wireless

Featured Sponsors

Top Ranked Routers

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Hi all, I'm enjoying experimenting with Merlin's firmware (donation on its way, thanks for such a great resource). I'm having some problems setting up...
First time using an Asus router. Where would one find the instructions for how to use the custom configuration window on the advanced settings page? ...
I was trying to setup a network in my apartment in my complex, but when I just plug in a single adapter I get a coax signal. I originally thought it w...
I have one (wireless) device that I'm trying to fully block (via iptables - not via mac address). I've entered drop rules on the input/forward/output ...
i dont know if this post is appropriate but i tried researching it online but i still dont have answers to this nor i understand what other people say...

Don't Miss These

  • 1
  • 2
  • 3