Quote:
|
Originally Posted by pussyserver
thats bullshit the router will not even let the offending systen connect if its MAC is not in the allow table. And as far as breaking any type of crypto in 10 mins...... whatever stop making up stuff.
show me a white paper or at least proof on concept
pussyservers.com calling people on bullshit since 2005
|
1) WEP is trivial to break, no white paper needed, just download the widely-available, freeware, open-source program to do it. Find it yourself.
2) 10 minutes is possible if the network is heavily utilized and they're only using 64 bits. Make it a couple hours if the network isn't highly utilized or they're using more bits in the key.
3) It's passive, a "connection" isn't necessary. Of course, after you've broken the WEP, you can certainlly find out the allowed MAC addresses, spoof one, and get a connection if you want to do more than just sniff out the target's passwords and the like.
4) Know WTF you're talking about before calling bullshit.