dc.contributor.author | DARADKEH, Yousef | |
dc.contributor.author | MU’NGER, Ahid AL | |
dc.date.accessioned | 2019-11-09T14:53:25Z | |
dc.date.available | 2019-11-09T14:53:25Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | DARADKEH, Yousef, MU’NGER, Ahid AL. Cracking Wired Equivalent Privacy (CWEP). In: Microelectronics and Computer Science: proc. of the 7th intern. Conf., September 22-24, 2011. Chişinău, 2011, vol. 1, pp. 333-337. ISBN 978-9975-45-174-1. | en_US |
dc.identifier.isbn | 978-9975-45-174-1 | |
dc.identifier.uri | http://repository.utm.md/handle/5014/6496 | |
dc.description.abstract | The fact that most wireless networks are not secured has been reported, discussed, lectured on, and more. About the only way you could have avoided this is if you were completely removed from every form of paper and electronic media. However, all this media hype has not had the desired effect! Believe it or not, an estimated 60[nd] 70% of all wireless networks in existence are still NOT using even the most basic of protections. As a result, any hacker can drive around the block and probably find an open and hack able wireless network. This is problem number one. Problem number two is a bit more technical, and will be the main subject for this article. This problem concerns the weaknesses surrounding WEP. The Wireless Equivalent Privacy protocol defines how a wireless network is secured. In short, it determines what encryption and authentication method is used to secure wireless data. The problem with WEP is in the way the data is encrypted. As discovered by three researchers, WEP can be cracked by anyone with a sniffer, which is the name given to the hardware device or software that can capture data as it flies through the air. This basically means that all those companies that think they are securely using their wireless network are doing so under false pretenses. This article deals with this issue, and explains just what cracking WEP means. I will show you just how hackers will attack you and take advantage of this weakness to capture your secret key right out of the air, which they can then use to connect to your secure wireless network. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Technical University of Moldova | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | cracking wep | en_US |
dc.subject | wireless networks | en_US |
dc.subject | networks | en_US |
dc.title | Cracking Wired Equivalent Privacy (CWEP) | en_US |
dc.type | Article | en_US |
The following license files are associated with this item: