Wired Equivalent Privacy (WEP) is a security algorithm for wireless networks.
Questions tagged [wep]
54 questions
2
votes
0 answers
FMS attack on WEP in C++
I'm trying to implement the FMS attack on WEP. I understand that the attack takes advantage of the probability of parts of the RC4 sbox not changing to create "known" sbox states to reverse engineer the key. With many samples, the correct key octet…

calccrypto
- 8,583
- 21
- 68
- 99
2
votes
1 answer
Get the current wifi security used on Android
I'm developping an app which may send sensitive data and I want to be sure that i don't send them on a public or weak protected network.
That's why I'd like to get the current security used on wifi network on Android.
I found this post but I'm not…

lemon
- 25
- 4
2
votes
1 answer
Android: extracting wifi capabilities with contains
I'm trying to know the type security of the scanned networks, and i'm getting result like this :
[WPA-PSK-TKIP+CCMP][WPA2-PSK-TKIP+CCMP][ESS]
[WPA2-PSK-CCMP][WPS][ESS]
And i used this code :
// Constants used for different security…

Amina
- 723
- 8
- 20
2
votes
1 answer
I'm using wpa_supplicant. How to know that the password is wrong when trying to connect to WEP protected AP?
For WPA/WPA2, wpa_supplicant can give message of wrong-password when the connection fails in the HANDSHAKE procedure.
But when I try the WEP with a wrong password, the wpa_supplicant can get to the COMPLETED state without reporting any error.
I've…

mosakashaka
- 535
- 1
- 6
- 19
1
vote
1 answer
WEP hacking and why IV capture is needed
trying to get my head around the theory of attacking WEP encryption, specifically IVs (Initialization Vectors). I understand the concept and purpose of the IV (bit like ‘salt’ appended to a password hash?):
seed=IV+WEP Key
IV is generally 24bits
IV…

daza166
- 3,543
- 10
- 35
- 41
1
vote
0 answers
WEP shared-key authentication response generation
While I was capturing packets with Wireshark using my phone I tried connect to my access point which has WEP shared-key authentication (only for testing purposes) and I got the authentication packets which contained the IV, challenge text, etc. Then…

bill
- 11
- 1
1
vote
0 answers
WEP: response computation for shared key authentication
after a very long research on the web, I'm still not able to find any code/algorithm that shows how the shared-key authentication works in WEP, and in particular how the response is computed.
The general concept is clear:
The mobile station (MB)…

SavioD
- 11
- 2
1
vote
1 answer
.NET Core WEB API System.Core.dll Reference Matching
I am new to .NET Core and trying to write a web service using .NET Core Web API in a project. The other sub projects are written in .NET Framework 4.5.
There is a project for Repository layer. I need to get all records by using repository in…

Cranberriess_
- 21
- 4
1
vote
7 answers
Can quantum algorithms be used for encryption?
Can quantum algorithms be useful?
Has any one been successful in putting quantum algorithms to any use?

kasperasky
- 3,173
- 5
- 21
- 16
1
vote
1 answer
MD5 Implementation In Swift
I'm writing my own simple MD5 implementation in Swift. I'm using it to generate a WEP key. (To generate a 128 bit WEP key you can use an MD5 hash function. You extend the passhphrase to a length of 64 bytes by concatenating it with itself and then…

crispy_bacon
- 31
- 5
1
vote
1 answer
C++ Determine security type (WEP or WPA) using linux library iwlib?
I need to create wpa_supplicant.conf for different type of encryption(WEP, WPA and NONE). I'm scanning for available AP using iwlib and wireless events. Problem is that i can't find security type in scanning result. How to do that?
Thank you for…

wallrite
- 21
- 6
1
vote
0 answers
Python 802.11 parser from raw socket
Working on a 802.11 parser from raw socket. The purpose of the parser is determine how much of the packet to keep for further processing. Only layer 2 is being saved, all layer 3 and above are stripped. All is well until the security portion. WEP…

WraithWireless
- 634
- 9
- 21
1
vote
0 answers
Standard algorithm for WEP key generator 64-bit
I have downloaded the following function from the internet. It's a WEP Key generator for 64-bit from a given passphrase, and I am wondering if a such algorithm is a standard algorithm or if it's an algorithm invented by the developer?
void…

MOHAMED
- 41,599
- 58
- 163
- 268
1
vote
2 answers
Is there a C library for WEP, WPA, and WPA2
Is there a library much like how openssl is imported into C programs that would allow easy access to WEP, WPA, and WPA2 functions?
I have never programmed in C and a friend is asking.

atrueresistance
- 1,358
- 5
- 26
- 48
0
votes
0 answers
Studying WEP wireless hacking
Studying WEP wireless hacking.
I am curious about the principle of ARP request replay attack
In this attack, if another client sends an ARP packet to the AP, it continues to send the same ARP packet.
When an AP receives this ARP packet, it is said…

1Tsw0rd
- 1
- 2