Differences between revisions 9 and 10
Revision 9 as of 2004-05-07 10:41:09
Size: 923
Editor: 207
Comment: spam removal
Revision 10 as of 2005-03-09 02:48:03
Size: 1058
Editor: 202
Comment:
Deletions are marked like this. Additions are marked like this.
Line 11: Line 11:
HyipInvestment EgoldEcurrency GetRich MakeMoney MlmAndDownlines ForexTrading WorkFromHome HomeBusiness OnlineInvesting SafeInvestment

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in "Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack.

AirSnort requires approximately 100M-1GB of data to be gathered. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second.

xxx


[CategorySoftware] HyipInvestment EgoldEcurrency GetRich MakeMoney MlmAndDownlines ForexTrading WorkFromHome HomeBusiness OnlineInvesting SafeInvestment

AirSnort (last edited 2007-11-23 18:03:18 by localhost)