

An attacker would have to capture hundreds of thousands or millions of packets-a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. Traditionally, cracking WEP keys has been a slow and boring process.

The IV is placed in encrypted frames header, and is transmitted in plain text.

A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.īoth sides must have the same WEP key, which is usually a total of 64 or 128 bits long. WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb. This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). Wireless Hacking Live - FBI Version ISO | 635 Mb Used by FBI
