O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

WEP attacks

The first attack we are going take a look at or re-examine in this particular chapter is the attack against the wired equivalent privacy, or WEP, protocol. We've encountered this protocol a few times in our journey through this book, and we're to take another look at it here, with some additional items added that weren't there before, and endeavor to expand on this attack so as to discuss the real weaknesses in this protocol that make it so vulnerable to attacks.

Remember that the WEP protocol is something that was implemented and designed when wireless security was something that was understood to be an issue, but the people at designed wireless technologies did not really understand how to properly implement security, nor did ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required