Feeds

Tool dumbs down wireless hacking

War driving for s'kiddiots

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

A hacking tool which can recover the encryption keys used to "protect" data sent over wireless networks has been released on the Internet.

AirSnort is one of the first tools that automates the process of breaking in wireless networks and takes advantages of flaws in the Wired Equivalent Protocol (WEP) which were highlighted by a group of cryptographers a couple of weeks ago.

This group, among them Adi Shamir, documented weaknesses in the key scheduling algorithm of RC4, which forms part of WEP. From there it was a short step to the development of AirSnort, which passively monitors the transmissions of a wireless Lan, computing the encryption password when enough packets (between 100MB-1GB) have been gathered.

To work AirSnort needs only to be installed on a Linux-operated computer with a wireless network card.

It's well known that the build security offered by 802.11b wireless networks is flaky. The hackers, Jeremy Bruestle and Blake Hegerle, told Wired their main motive was to "open people's eyes" to this. They hope vendors will improve the security that comes with their products to defend against AirSnort.

That's as maybe but the emergence of AirSnort, and soon another similar tool called WEPcrack (which is still in development), are certain to deskill the process of breaking into wireless networks and in so doing open them up to s'kiddiots everywhere.

AirSnort is very much a double-edged sword... ®

Related Stories

Rogue WLANS - the next security battlefield?
Wireless security is even flakier than we thought
War driving by the Bay

External Links

Wireless Networks in Big Trouble (Wired)

5 things you didn’t know about cloud backup

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?