[Date Prev][Date
Next][Thread Prev][Thread Next][Date
Index][Thread Index]
Wireless security
- To: "UKHA" <ukha_d@xxxxxxx>
- Subject: Wireless security
- From: "Dr John Tankard" <john@xxxxxxx>
- Date: Wed, 29 Aug 2001 15:31:04 +0100
- Delivered-to: rich@xxxxxxx
- Delivered-to: mailing list ukha_d@xxxxxxx
- Mailing-list: list ukha_d@xxxxxxx; contact
ukha_d-owner@xxxxxxx
- Reply-to: ukha_d@xxxxxxx
Just red this from Silicon
Hackers are storming wireless networks with AirSnort, a new program
designed
to attack one of the most established wireless standards on the market.
AirSnort allows hackers to capture data transmitted over any wireless
network supposedly protected by the Wired Equivalent Privacy (WEP) system,
otherwise known as the 802.11b standard, which encrypts information as it
is
transmitted.
The 802.11b standard transmits in direct sequence connections over public
airwaves that are also shared by television, radio and mobile phone
transmissions.
When sufficient data is collected, AirSnort pieces together the system's
password.
US security company, Argus, is in agreement with AirSnort developers who
believe 802.11b is an insecure and easily hackable encryption mechanism.
AirSnort developers said as well as allowing users to infiltrate networks,
the program is a slap in the face to those that denied previous rumours
that
the standard was insecure and inappropriate for corporate use.
An earlier released tool called WEPcrack is also able to hack into the
wireless standard, but not as quickly as AirSnort.
Home |
Main Index |
Thread Index
|