Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?

Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?

Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?

A.
All IVs are vulnerable to attack

B.
Air Snort uses a cache of packets

C.
Air Snort implements the FMS attack and only encrypted packets are counted

D.
A majority of weak IVs transmitted by access points and wireless cards are not filtered by contemporary wireless manufacturers

Explanation:
Since the summer of 2001, WEP cracking has been a trivial but time consuming process. A few tools, AirSnort perhaps the most famous, that implement the Fluhrer-Mantin-Shamir (FMS) attack were released to the security community — who until then were aware of the problems with WEP but did not have practical penetration testing tools. Although simple to use, these tools require a very large number of packets to be gathered before being able to crack a WEP key. The AirSnort web site estimates the total number of packets at five to ten million, but the number actually required may be higher than you think.



Leave a Reply 0

Your email address will not be published. Required fields are marked *