View Single Post
Old 08-24-2004, 07:27 PM   #14 (permalink)
Mephisto2
Junkie
 
Quote:
Originally Posted by Manorotsky
Yes I found the encryption key, if thats what WEP is. I set the character and all. btw what is WEP.

ps. thanks for responses.

WEP stands for Wired Equivalent Privacy and was the original encryption technique defined in the 802.11 standards. It was supposed to offer good security but has proven to be fundamentally flawed.

Initially, only 40bit keys were required, but that has since risen to 128bit.

However, based upon the fact that WEP relies on RC4 (not the strongest encryption standard), and uses 24bit IV (Initialization Vectors) to generate the WEP key itself, a good hacker can "listen in" and when they have captured enough packets can decode your WEP key. In other words, they can break your encryption.

This is often called the Airsnort attack, after the first popular tool designed to exploit it, but it was originally described as the Fluhrer style attack, after one of the authors who wrote a white-paper describing the vulnerability. Some people also call this WarDriving (or WarWalking). However, WarDriving is simply the process of driving around with a laptop and a wireless NIC, trying to find wireless networks. You would be appalled at how many are not secured properly and the WarDriver simply has to associate to get access to the network. That is what WarDriving is, not the specific cracking of the WEP encryption.

As a matter of historical (and geeky) interest, the term WarDriving is an evolution of the older hacker term WarDialing. WarDialing is the process of setting up a modem to systematically dial phone numbers, on the off chance you will eventually get a modem to respond. In the old days, most modems were simply configured to accept an incoming call and if you were lucky enough hit upon a number with a modem attached, more times than not you got inside that computer system. Remember, this is back in the 80's when most large computer systems still used modems for Sys Admins to do remote management, or even send email etc.

This is the way the hacker got into the Pentagon in the movie "War Games". Remember that movie?

Well, WarGames.... WarDialing... WarDriving.... get it?

Basically, the process is the same. Keep searching until you find an unsecured entry point and bingo... you're in.


Now, back to WEP.


The big problem with WEP used to be the fact that if a hacker collected enough packets, they could break your encryption. Originally the only way to address this was with enterprise class authentication protocols (based on something called EAP, or Extensible Authentication Protocol) that dynamically assigned a different WEP key to the user each time they logged on. When they logged on the next day, or when they roamed from Access Point to Access Point (remember large companies are generally going to have several APs on a floor), they would get a new WEP key. You could even configure the system to automatically create a new WEP key every few minutes, even if the user didn't roam. The most famous and popular EAP mechanism that provided dynamic key management (as it was called) was and still is Cisco LEAP.

By changing the WEP key every few minutes, every time the user logged on, and every time the user moved around the building, it made it very difficult for the hacker to collect enough packets using the same WEP key to successfully crack it.

But home users were still left in the dark. The only way they could avoid this kind of attack was to manually change the WEP key as often as possible. This is a pain, but you must remember that 90%+ of wireless hacking attacks are "opportunistic"; in other words they are WarDriving attacks. If someone has to dick around capturing packets and trying to decode WEP keys, they will probably move on to somewhere less secure. But dedicated or geeky hackers do exist and they do use Airsnort. That' why it's a good idea to change your WEP key as regularly as possible.

The good news is that WPA does all this automatically for you in the background. It effectively uses a different WEP key for every single packet. In other words, no way a hacker can decrypt your WEP key in a WPA environment.

It also allows you to setup a "timer" that means both the Access Point and the client regularly agree a brand new WEP key on a regular basis. This is handled by entering what's called a shared secret (or sometimes passphrase) on both devices. When the timer runs out, they both run the passphrase through an encryption algorithm and come up with a new WEP key independently. But because they both have the same passphrase, the new WEP key is identical for the Access Point and the client. Voila! You have a new WEP key and you never transmitted it over the air.

The problem lies with the length of the passphrase. Originally the specification called for a 20 character passphrase, but the equipment manufactures whined that this was too long for their dumb customers. The standard was revised to allow for passphrases of 8 characters minimum, instead of 20. The real problem is that with a short passphrase, you can actually be more vulnerable to attack!!! In other words, if you use WPA, make sure your passphrase is at least 20 characters long. It's worth it.


So, in summary


WEP = bad, old, vulnerable.
WPA = good, new(ish), secure if you use long passphrases
802.11i = excellent, new, rock solid Pentagon class security
WPA2 = same as 802.11i, just a different name


I haven't touched on 802.11i or WPA2 (or RSN, Robust Security Network) standards here, as they are mostly enterprise class solutions, but if anyone is interested please just ask.



Mr Mephisto
Mephisto2 is offline  
 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360