Completed
Implications
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cracking WEP Keys
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Talk overview
- 3 Why Perform Dictionary attacks on WEP?
- 4 Wired Equivalent Privacy
- 5 WEP Encryption
- 6 WEP Authentication
- 7 128-bit Variant
- 8 WEP Keying
- 9 Key Entry Example
- 10 64-bit key Generator
- 11 64-bit Generator Flawed!
- 12 ASCI Mapping Reduces Entropy
- 13 PRNG Use Reduces Entropy
- 14 Entropy of 64-bit Generator is 21-bits
- 15 128-bit Generator
- 16 Designed and implemented a WEP Cracker
- 17 Structure of WEP Cracker
- 18 Packet Collector
- 19 Making Guesses
- 20 Mapping Guesses to Keys
- 21 Key Verification
- 22 Results
- 23 Brute Force of Keys
- 24 Implications
- 25 Related work - Bad News
- 26 That's All Folks...