The UK Home Automation Archive

Archive Home
Group Home
Search Archive


Advanced Search

The UKHA-ARCHIVE IS CEASING OPERATIONS 31 DEC 2024


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Wireless security


  • To: "UKHA" <ukha_d@xxxxxxx>
  • Subject: Wireless security
  • From: "Dr John Tankard" <john@xxxxxxx>
  • Date: Wed, 29 Aug 2001 15:31:04 +0100
  • Delivered-to: rich@xxxxxxx
  • Delivered-to: mailing list ukha_d@xxxxxxx
  • Mailing-list: list ukha_d@xxxxxxx; contact ukha_d-owner@xxxxxxx
  • Reply-to: ukha_d@xxxxxxx

Just red this from Silicon

Hackers are storming wireless networks with AirSnort, a new program
designed
to attack one of the most established wireless standards on the market.

AirSnort allows hackers to capture data transmitted over any wireless
network supposedly protected by the Wired Equivalent Privacy (WEP) system,
otherwise known as the 802.11b standard, which encrypts information as it
is
transmitted.

The 802.11b standard transmits in direct sequence connections over public
airwaves that are also shared by television, radio and mobile phone
transmissions.

When sufficient data is collected, AirSnort pieces together the system's
password.

US security company, Argus, is in agreement with AirSnort developers who
believe 802.11b is an insecure and easily hackable encryption mechanism.

AirSnort developers said as well as allowing users to infiltrate networks,
the program is a slap in the face to those that denied previous rumours
that
the standard was insecure and inappropriate for corporate use.

An earlier released tool called WEPcrack is also able to hack into the
wireless standard, but not as quickly as AirSnort.




Home | Main Index | Thread Index

Comments to the Webmaster are always welcomed, please use this contact form . Note that as this site is a mailing list archive, the Webmaster has no control over the contents of the messages. Comments about message content should be directed to the relevant mailing list.