SlideShare a Scribd company logo
Breaking Wireless Security cracking WEP & WPA presented by  Casey DC207
what we're covering Using aircrack-ng suite to capture wireless traffic
retrieve WEP password
retrieve WPA/WPA2 passwords
what we're not covering cryptographic specifics
in depth packet analysis
brute forcing WPS (Wi-Fi Protected Setup) time
t00ls BackTrack Linux
Aircrack-ng
ALFA Wireless USB Adapter  (Model AWUS036H)
Yay!  BlueTarp!
WEP Wired Equivalent Privacy (WEP)
Sept. 1999 in original 802.11 standard
uses an RC4 Stream Cipher
crypto is inherently flawed
deprecated in 2004 in favor of WPA2
still available on routers today
WEP encryption RC4 cipher uses Key + IV (Initial Values)
august 2001, Scott Fluhrer, Itsik Mantin, and Adi Shamir
passive attack to recover Key

More Related Content

PPT
How to hack wireless internet connections using aircrack-ng
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
PPTX
PDF
A tutorial showing you how to crack wifi passwords using kali linux!
PPTX
WIFI Hacking
PDF
Cracking WPA/WPA2 with Non-Dictionary Attacks
PPTX
Wifi hacking
PDF
Hack wifi password using kali linux
How to hack wireless internet connections using aircrack-ng
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
A tutorial showing you how to crack wifi passwords using kali linux!
WIFI Hacking
Cracking WPA/WPA2 with Non-Dictionary Attacks
Wifi hacking
Hack wifi password using kali linux

What's hot (20)

PPTX
Hacking Wireless Networks : Null Delhi (November)
PPTX
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
DOC
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
PPTX
Wireless hacking
PPT
How to hack wireless internet connections
PPT
How To Hack Wireless Internet Connections
PPTX
Wi-FI Hacking
PPT
Wifi Security
PPTX
Wireless hacking
PPT
Firewall
PPTX
PDF
Pentesting Wireless Networks and Wireless Network Security
PPTX
WPA-3: SEA and Dragonfly
PDF
Understanding WiFi Security Vulnerabilities and Solutions
PPTX
WiFi Secuiry: Attack & Defence
PDF
Brute forcing Wi-Fi Protected Setup
PPTX
WLAN Attacks and Protection
PPTX
WPA3 - What is it good for?
PDF
Wireless Hacking
PDF
Wi-Fi security – WEP, WPA and WPA2
Hacking Wireless Networks : Null Delhi (November)
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Wireless hacking
How to hack wireless internet connections
How To Hack Wireless Internet Connections
Wi-FI Hacking
Wifi Security
Wireless hacking
Firewall
Pentesting Wireless Networks and Wireless Network Security
WPA-3: SEA and Dragonfly
Understanding WiFi Security Vulnerabilities and Solutions
WiFi Secuiry: Attack & Defence
Brute forcing Wi-Fi Protected Setup
WLAN Attacks and Protection
WPA3 - What is it good for?
Wireless Hacking
Wi-Fi security – WEP, WPA and WPA2
Ad

Viewers also liked (10)

PPTX
Man in the Middle Attack on Banks
PPTX
Man In The Middle
PPTX
Man in The Middle Attack
PPS
Heart Attack !! Survival Technique -Don’t Ever Think That You Are Not Prone T...
PPTX
Hacking By Nirmal
PDF
Man in the middle attacks on IEC 60870-5-104
PPT
The cat and the bellالقط والجرس
PPTX
Introduction to security
PPTX
التعرف على الاختراقات في الشبكات المحلية
PDF
Man in the Middle Atack
Man in the Middle Attack on Banks
Man In The Middle
Man in The Middle Attack
Heart Attack !! Survival Technique -Don’t Ever Think That You Are Not Prone T...
Hacking By Nirmal
Man in the middle attacks on IEC 60870-5-104
The cat and the bellالقط والجرس
Introduction to security
التعرف على الاختراقات في الشبكات المحلية
Man in the Middle Atack
Ad

Similar to Feb-8-2012-Breaking-Wireless-Security (20)

PPTX
Wifi cracking
PPTX
Wireless Security null seminar
PDF
Wireless Cracking using Kali
PPTX
Exploiting WiFi Security
PDF
DTS Solution - Wireless Security Protocols / PenTesting
PDF
Hacking Wireless Networks by Mandeep Singh Jadon
PDF
Talk2 esc2 muscl-wifi_v1_2b
PPT
RSA - WLAN Hacking
PPT
Wireless security presentation
PPTX
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
PPT
Wireless security837
PPTX
Wifi cracking Step by Step Using CMD and Kali Linux 2018
PPT
WiFi practical hacking "Show me the passwords!"
PPTX
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPT
Shashank wireless lans security
PPTX
Wireless penetration testing
PDF
Wi-fi Hacking
PDF
Aircrack
PPT
Cracking wep and wpa wireless networks
PDF
Wifi cracking
Wireless Security null seminar
Wireless Cracking using Kali
Exploiting WiFi Security
DTS Solution - Wireless Security Protocols / PenTesting
Hacking Wireless Networks by Mandeep Singh Jadon
Talk2 esc2 muscl-wifi_v1_2b
RSA - WLAN Hacking
Wireless security presentation
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless security837
Wifi cracking Step by Step Using CMD and Kali Linux 2018
WiFi practical hacking "Show me the passwords!"
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
Shashank wireless lans security
Wireless penetration testing
Wi-fi Hacking
Aircrack
Cracking wep and wpa wireless networks

Recently uploaded (20)

PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
August Patch Tuesday
PDF
Getting Started with Data Integration: FME Form 101
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
OMC Textile Division Presentation 2021.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
Heart disease approach using modified random forest and particle swarm optimi...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
August Patch Tuesday
Getting Started with Data Integration: FME Form 101
Spectral efficient network and resource selection model in 5G networks
cloud_computing_Infrastucture_as_cloud_p
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine Learning_overview_presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction

Feb-8-2012-Breaking-Wireless-Security