A weblog about wardriving in Toronto, here I read about:
How WEP was broken
A paper describing how WEP was broken for under $100 by some summer interns at AT&T labs… Must’ve been quite a summer project. I wonder if they were hired to do something like this…
Summary: If you sniff about 5M-7M wireless packets on a WEP encrypted channel, you can deduce the WEP key quite easily. Look for AirSnort for the implementation of this attack.
Conclusion: WEP is broken, so use it at your own risk. MAC Address filtering is probably a better way to go, but even that is not terribly secure as many wireless cards can have their MAC address changed on demand.
:: Wireless Bandit RSS/XML News Syndicated ::