Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?

Posted by: Pdfprep Category: CEH-001 Tags: , ,

Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?
A . All IVs are vulnerable to attack
B . Air Snort uses a cache of packets
C . Air Snort implements the FMS attack and only encrypted packets are counted
D . A majority of weak IVs transmitted by access points and wireless cards are not filtered by contemporary wireless manufacturers

Answer: C

Explanation:

Since the summer of 2001, WEP cracking has been a trivial but time consuming process. A few tools, AirSnort perhaps the most famous, that implement the Fluhrer-Mantin-Shamir (FMS) attack were released to the security community — who until then were aware of the problems with WEP but did not have practical penetration testing tools. Although simple to use, these tools require a very large number of packets to be gathered before being able to crack a WEP key. The AirSnort web site estimates the total number of packets at five to ten million, but the number actually required may be higher than you think.

Leave a Reply

Your email address will not be published.