Questions tagged [wep]

Wired Equivalent Privacy (WEP) is a security algorithm for wireless networks.

54 questions
2
votes
0 answers

FMS attack on WEP in C++

I'm trying to implement the FMS attack on WEP. I understand that the attack takes advantage of the probability of parts of the RC4 sbox not changing to create "known" sbox states to reverse engineer the key. With many samples, the correct key octet…
calccrypto
  • 8,583
  • 21
  • 68
  • 99
2
votes
1 answer

Get the current wifi security used on Android

I'm developping an app which may send sensitive data and I want to be sure that i don't send them on a public or weak protected network. That's why I'd like to get the current security used on wifi network on Android. I found this post but I'm not…
lemon
  • 25
  • 4
2
votes
1 answer

Android: extracting wifi capabilities with contains

I'm trying to know the type security of the scanned networks, and i'm getting result like this : [WPA-PSK-TKIP+CCMP][WPA2-PSK-TKIP+CCMP][ESS] [WPA2-PSK-CCMP][WPS][ESS] And i used this code : // Constants used for different security…
Amina
  • 723
  • 8
  • 20
2
votes
1 answer

I'm using wpa_supplicant. How to know that the password is wrong when trying to connect to WEP protected AP?

For WPA/WPA2, wpa_supplicant can give message of wrong-password when the connection fails in the HANDSHAKE procedure. But when I try the WEP with a wrong password, the wpa_supplicant can get to the COMPLETED state without reporting any error. I've…
mosakashaka
  • 535
  • 1
  • 6
  • 19
1
vote
1 answer

WEP hacking and why IV capture is needed

trying to get my head around the theory of attacking WEP encryption, specifically IVs (Initialization Vectors). I understand the concept and purpose of the IV (bit like ‘salt’ appended to a password hash?): seed=IV+WEP Key IV is generally 24bits IV…
daza166
  • 3,543
  • 10
  • 35
  • 41
1
vote
0 answers

WEP shared-key authentication response generation

While I was capturing packets with Wireshark using my phone I tried connect to my access point which has WEP shared-key authentication (only for testing purposes) and I got the authentication packets which contained the IV, challenge text, etc. Then…
bill
  • 11
  • 1
1
vote
0 answers

WEP: response computation for shared key authentication

after a very long research on the web, I'm still not able to find any code/algorithm that shows how the shared-key authentication works in WEP, and in particular how the response is computed. The general concept is clear: The mobile station (MB)…
SavioD
  • 11
  • 2
1
vote
1 answer

.NET Core WEB API System.Core.dll Reference Matching

I am new to .NET Core and trying to write a web service using .NET Core Web API in a project. The other sub projects are written in .NET Framework 4.5. There is a project for Repository layer. I need to get all records by using repository in…
1
vote
7 answers

Can quantum algorithms be used for encryption?

Can quantum algorithms be useful? Has any one been successful in putting quantum algorithms to any use?
kasperasky
  • 3,173
  • 5
  • 21
  • 16
1
vote
1 answer

MD5 Implementation In Swift

I'm writing my own simple MD5 implementation in Swift. I'm using it to generate a WEP key. (To generate a 128 bit WEP key you can use an MD5 hash function. You extend the passhphrase to a length of 64 bytes by concatenating it with itself and then…
1
vote
1 answer

C++ Determine security type (WEP or WPA) using linux library iwlib?

I need to create wpa_supplicant.conf for different type of encryption(WEP, WPA and NONE). I'm scanning for available AP using iwlib and wireless events. Problem is that i can't find security type in scanning result. How to do that? Thank you for…
wallrite
  • 21
  • 6
1
vote
0 answers

Python 802.11 parser from raw socket

Working on a 802.11 parser from raw socket. The purpose of the parser is determine how much of the packet to keep for further processing. Only layer 2 is being saved, all layer 3 and above are stripped. All is well until the security portion. WEP…
WraithWireless
  • 634
  • 9
  • 21
1
vote
0 answers

Standard algorithm for WEP key generator 64-bit

I have downloaded the following function from the internet. It's a WEP Key generator for 64-bit from a given passphrase, and I am wondering if a such algorithm is a standard algorithm or if it's an algorithm invented by the developer? void…
MOHAMED
  • 41,599
  • 58
  • 163
  • 268
1
vote
2 answers

Is there a C library for WEP, WPA, and WPA2

Is there a library much like how openssl is imported into C programs that would allow easy access to WEP, WPA, and WPA2 functions? I have never programmed in C and a friend is asking.
atrueresistance
  • 1,358
  • 5
  • 26
  • 48
0
votes
0 answers

Studying WEP wireless hacking

Studying WEP wireless hacking. I am curious about the principle of ARP request replay attack In this attack, if another client sends an ARP packet to the AP, it continues to send the same ARP packet. When an AP receives this ARP packet, it is said…
1Tsw0rd
  • 1
  • 2