Wireless Network Security - Cracking WEP

Tuesday, February 10, 2009

I made a video today for my data communication class. It was on wireless security and how to crack WEP. I posted it on itv.fiu.edu which is FIU's version of youtube. The quality was destroyed but here it is for all to see, please comment. Thanks:



As you can see I did not go much into installing Ubuntu on a VM, the USB wireless card I used, how to install aircrack-ng or how to install the modified drivers for the card. I spent most of the time for this project debating on what USB wireless card to get. I have a new MacBook Pro and the Airport Extreme does not allow injection and running a VM doesn't allow me to use the wireless card on linux. I could have used a live CD but I didn't want to be switching back and forth. Also in the news BTW,

BackTrack 4 Beta is out. I haven't downloaded yet because it is going very slow but let me know what you think when you get it.

Comments

2 Responses to “Wireless Network Security - Cracking WEP”
Post a Comment | Post Comments (Atom)

These are some good suggestions for home and small office users. For business users, however, this level of security won't cut it.

In our health care environment, we utilize WPA2 encryption without a PSK, the key is supplied after the machine authenticates via RADIUS using their domain credentials. The MAC address also has to meet a list of authorized devices. The antennae gain is turned down as to try to contain the wireless signal within our campus.

February 11, 2009 at 8:01 AM
Jorge Orchilles said...

Same for where I work, we have WPA2 encryption with AES. Each client must have a certificate and validate with the RADIUS using domain credentials. We do have a public network for guests that once you connect are prompted for a daily code. Then you only have external access :)

February 11, 2009 at 6:36 PM