Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Wireless How To

Closing Thoughts

WEP was never meant to secure a network, but was designed only to provide a WLAN with the level of security and privacy comparable to that expected of a wired LAN. This is clearly indicated by its full name, "Wired Equivalent Privacy". Recovering a WEP key is the equivalent of gaining physical access to a wired network. What happens next depends on the steps that have been taken to secure resources of the network itself.

Enterprises have long used authentication and sometimes VPNs to secure their wireless LANs. Unfortunately, most home and many small businesses have neither the skills, equipment or, most importantly, the desire to control network access via authentication.

As we said at the beginning, a lot has changed in the two years since our original article. The tools have gotten better and more powerful, as anyone who uses the aircrack-ng suite will agree.

But the wireless landscape has changed, too. Users are finally moving to WPA and WPA2 security instead of WEP. This trend could actually accelerate with the transition to draft 11n, which achieves its best secured speeds with WPA2, and falls back to 802.11g speeds when WEP is used. And even users who haven't yet moved to WPA/WPA2 are at least running WEP. So maybe they are listening to all of the warnings after all.

We're sure no one who reads SmallNetBuilder would be foolish enough to be using WEP, as WEP cracking isn't exactly new. But think about your friends and family. Perhaps they aren't aware of the limitations of their chosen encryption. Some may not even be aware that encryption is required! Kevin was appalled to find that half the WEP encrypted networks he could see had hardware less than a year old, provided by British Telecom, one of the largest suppliers of broadband in the UK!

Remember, with great power comes great responsibility! Use your new skills to show friends, family and co-workers that their WEP-encrypted networks provide only an illusion of security.

We would like to thank the following people and sites that helped us produce this article:

  • Christophe Devine and all the contributors to the aircrack-ng suite
  • Max Moser and the rest of the remote-exploit team for Back Track
  • UmInAsHoE over at
  • David and others over here for tips on using the Ralink shipset.

More Wireless

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

RT AC68WFW Merlin 384.13I have a 4TB drive. I've partitioned it so the first partition is 500GB and the second partition is 3.5TB. The labels for each...
Hello, I recently moved into a new house and had the internet set up by Cox. I would like to extend wired internet to the upstairs rooms but don't wan...
I'm running 384.13 on an 86U. On enabling the Openvpn server I get the following message next to the Export OpenVPN Configuration File on the GUI."Ini...
I have a couple of RT-AC68Us (orig T-Mo CellSpots) which are running Merlin 384.13. Couple of months ago I OC'ed them to 1000,800. I now find that the...
Hi,I have an Asus AC-RT68R running Merlin FW 384.13 and I noticed a strange issue with a wired security camera I just installed. It is showing up in t...

Don't Miss These

  • 1
  • 2
  • 3