View Single Post
Old 10-05-2005, 11:01 AM  
Kyo
Registered User
 
Join Date: Jul 2005
Location: VA, USA
Posts: 87
Quote:
Originally Posted by pussyserver
thats bullshit the router will not even let the offending systen connect if its MAC is not in the allow table. And as far as breaking any type of crypto in 10 mins...... whatever stop making up stuff.

show me a white paper or at least proof on concept

pussyservers.com calling people on bullshit since 2005
1) WEP is trivial to break, no white paper needed, just download the widely-available, freeware, open-source program to do it. Find it yourself.

2) 10 minutes is possible if the network is heavily utilized and they're only using 64 bits. Make it a couple hours if the network isn't highly utilized or they're using more bits in the key.

3) It's passive, a "connection" isn't necessary. Of course, after you've broken the WEP, you can certainlly find out the allowed MAC addresses, spoof one, and get a connection if you want to do more than just sniff out the target's passwords and the like.

4) Know WTF you're talking about before calling bullshit.
Kyo is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote