Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?
A.
All IVs are vulnerable to attack
B.
Air Snort uses a cache of packets
C.
Air Snort implements the FMS attack and only encrypted packets are counted
D.
A majority of weak IVs transmitted by access points and wireless cards are not filtered by
contemporary wireless manufacturers
Explanation:
Since the summer of 2001,WEP cracking has been a trivial but time consuming
process. A few tools,AirSnort perhaps the most famous,that implement the Fluhrer-Mantin-Shamir
(FMS) attack were released to the security community — who until then were aware of the
problems with WEP but did not have practical penetration testing tools. Although simple to
use,these tools require a very large number of packets to be gathered before being able to crack a
WEP key. The AirSnort web site estimates the total number of packets at five to ten million,but the
number actually required may be higher than you think.