Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How does the Newsham 21-bit attack work?

Attack bit
0
10 Posted

How does the Newsham 21-bit attack work?

0
10

A lot of wireless access points offer a key generation process on the basis of an easy to remember passphrase. Unfortunately, some companies implement a very dangerous algorithm for the generation of 40-bit WEP keys. This algorithm only generates keys with an effective strength of 21 bits. KisMAC is able to bruteforce these keys in a very short time. Access Points from the following companies appear to be vulnerable: Linksys, D-Link, Belkin, Netgear… The following companies use other algorithms: 3Com, Apple, 2Wire.

0

A lot of wireless access points offer a key generation process on the basis of an easy to remember passphrase. Unfortunately, some companies implement a very dangerous algorithm for the generation of 40-bit WEP keys. This algorithm only generates keys with an effective strength of 21 bits. KisMAC is able to bruteforce these keys in a very short time. Access Points from the following companies appear to be vulnerable: Linksys, D-Link, Belkin, Netgear… The following companies use other algorithms: 3Com, Apple.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.