Skip to Content
Learn Ethical Hacking from Scratch
book

Learn Ethical Hacking from Scratch

by Zaid Sabih
July 2018
Beginner
564 pages
12h 22m
English
Packt Publishing
Content preview from Learn Ethical Hacking from Scratch

WEP theory

The first encryption that we will discuss is Wired Equivalent Privacy (WEP) encryption, because it's the oldest one, and also the easiest one to break. WEP encryption uses an algorithm called RC4; each packet is encrypted at the Access Point (AP), and then sent out into the air. Once the client receives it, the client will be able to decrypt the packet and read the information inside of it, since the client has the key. In short, the AP encrypts the packet and sends it, and the client receives and decrypts it. In the same way, when the client itself sends the packet, the client encrypts it and then sends it out, and the AP receives and decrypts it with a key.

Each packet that is sent out has a unique key stream. WEP ensures that ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learn Ethical Hacking From Scratch

Learn Ethical Hacking From Scratch

Zaid Sabih
Ethical Hacking Masterclass

Ethical Hacking Masterclass

SUNIL GUPTA (India), Sunil Gupta
Ethical Hacking

Ethical Hacking

Ric Messier
Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781788622059Supplemental Content