Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Wireless How To

Closing Thoughts

WEP was never meant to secure a network, but was designed only to provide a WLAN with the level of security and privacy comparable to that expected of a wired LAN. This is clearly indicated by its full name, "Wired Equivalent Privacy". Recovering a WEP key is the equivalent of gaining physical access to a wired network. What happens next depends on the steps that have been taken to secure resources of the network itself.

Enterprises have long used authentication and sometimes VPNs to secure their wireless LANs. Unfortunately, most home and many small businesses have neither the skills, equipment or, most importantly, the desire to control network access via authentication.

As we said at the beginning, a lot has changed in the two years since our original article. The tools have gotten better and more powerful, as anyone who uses the aircrack-ng suite will agree.

But the wireless landscape has changed, too. Users are finally moving to WPA and WPA2 security instead of WEP. This trend could actually accelerate with the transition to draft 11n, which achieves its best secured speeds with WPA2, and falls back to 802.11g speeds when WEP is used. And even users who haven't yet moved to WPA/WPA2 are at least running WEP. So maybe they are listening to all of the warnings after all.

We're sure no one who reads SmallNetBuilder would be foolish enough to be using WEP, as WEP cracking isn't exactly new. But think about your friends and family. Perhaps they aren't aware of the limitations of their chosen encryption. Some may not even be aware that encryption is required! Kevin was appalled to find that half the WEP encrypted networks he could see had hardware less than a year old, provided by British Telecom, one of the largest suppliers of broadband in the UK!

Remember, with great power comes great responsibility! Use your new skills to show friends, family and co-workers that their WEP-encrypted networks provide only an illusion of security.


We would like to thank the following people and sites that helped us produce this article:

  • Christophe Devine and all the contributors to the aircrack-ng suite
  • Max Moser and the rest of the remote-exploit team for Back Track
  • UmInAsHoE over at governmentsecurity.org
  • David and others over here for tips on using the Ralink shipset.

More Wireless

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

It looks that while Samba in Merlin shares main admin login and password, the number of SMB connections is limited to 1, regardless of configured in c...
Hello Snb community !I am new to Routers, Assus and Merlin, If i may I have a question for the community.I understand how to locate and Install softwa...
Of course you can open the WebUI to get your public ip address, but how about getting it programmatical?Actually, it's simple, just add this line to '...
Hello. I use Merlin 384.13. Is there a way to enter a system command? I understand Merlin is not WRT however to clarify what I am talking about on WRT...
Hi all,I just moved into a new 2-story house with pre-existing coaxial wiring, but its not wired with CAT5 like my old place. My current setup is:Arr...

Don't Miss These

  • 1
  • 2
  • 3