O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing by Robert W. Beggs

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Compromising a WEP encryption

Wireless Equivalent Privacy (WEP) originated in 1999 as a means of providing a degree of confidentiality to 802.11 wireless networks that was comparable to what was available on a wired network. Multiple flaws were quickly discovered in its implementation of cryptography, and by 2004 it was superseded by the WiFi Protected Access (WPA) protocol.

Note

WEP remains in use today, particularly in the older networks that can't support the resource requirements of the new wireless routers. In a recent wireless survey of a major metropolitan centre, almost 25 percent of the encrypted wireless networks continued to use WEP. Many of these networks were associated with financial companies.

One of primary flaws of WEP was first ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required