WEP authentication, why WEP authentication scheme is flawed and how it can be attacked

Can someone please explain to me:

WEP authentication?

Why WEP authentication scheme is flawed?

How it can be attacked?

Thank you,

Johnny.

Reply to
Johnny
Loading thread data ...

"Johnny" hath wroth:

formatting link

formatting link

formatting link

Reply to
Jeff Liebermann

Thanks Jeff but I'm after the theory of how it can be attacked. Can you please provide me with information regarding this?

Thanks,

Reply to
Johnny

"Johnny" hath wroth:

You mean exactly how the various WEP exploit tools work? I'm not interested in expounding on that. Do your own research. There are quite a few links, references, and tools listed at the bottom of:

formatting link
There's also a huge mass of wireless security references and URL's at:
formatting link

Reply to
Jeff Liebermann

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.