Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Jim Veneskey (jvenecisco.com)
Date: Tue Sep 04 2001 - 07:09:20 CDT
Have you tried Airsnort?
I have tested it - and it works as advertised against a single key cell.
However - simply by having my client transmit using one WEP key, and my
AP transmit using another, confused Airsnort to the point of unusability.
To really confuse it - introduce LEAP with dynamically changing WEP keys
with short timeouts.
Airsnort in it's current form is NOT the "Super Cracker Tool" the media
is making it out to be. Someday with some work it may come close...
Airsnort IS a wakeup call for networks that rely solely on a single
static WEP key for their entire network. In my opinion ("my" as in "me" - not
Cisco) it is however, not cause to be completely dismissing WEP altogether
- especially WEP with dynamically generated keys...
ps - I see a new version came out over the weekend, and while I have NOT
tested it yet - looking through the CVS repository does not suggest the
failings I have mentioned have been fixed.
On Mon, Sep 03, 2001 at 02:05:49PM +0200, Jean-Pierre Ebert wrote:
> Do not use WEP at all - it works but not as intended.
> If you do not have the time to probe how to crack a
> WEP encrypted Aironet check our Airsnort a public
> available tool.
> Instead of using WEP think of ssh, ssl, shttp, firewalls,
> DHCP, NAT and several other authentification mechanisms.
> Keep in mind that you need to stay up to date as a sysop,
> since any security solution is obsolete after some months
> (,weeks or days).
> Vesa.Wimmertietoenator.com wrote:
> > Hello Everybody!
> > Last month there have been a lot of talking about wlan security. Recently
> > there were told that the wlan encryption is able to break quite easily and
> > fast. I think that this subject has caused a lot of headache for wlan
> > administrators for the time being. I think I'm one of them. =)
> > I'd like to ask your opinions about this security issue and its affects to
> > the Cisco's security solution. Do you think that this Cisco's solution is
> > still good enough to protect your important data or do you think that it
> > would be better to build wireless LAN outside the firewall nowadays and use
> > VPN or other encryption to protect your data?
> > Thanks!
> > -Vesa-
> > _______________________________________________
> > Aironet mailing list - Aironetcsl.cse.ucsc.edu
> > http://csl.cse.ucsc.edu/mailman/listinfo/aironet
> Aironet mailing list - Aironetcsl.cse.ucsc.edu
-- | | Jim Veneskey :|: :|: Software Test Engineer :|||: :|||: 320 Springside Drive Suite 350, Akron OH 44333 .:|||||||:..:|||||||:. Email: jvenecisco.com _______________________________________________ Aironet mailing list - Aironetcsl.cse.ucsc.edu http://csl.cse.ucsc.edu/mailman/listinfo/aironet