Skip to main content

TheBroken and wireless cracking

More
19 years 9 months ago #6845 by MezzUp
Hi there,

Again, I know this might not be the correct forum, so feel free to move this thread.

Anyway, I just wanted to tell you guys about www.thebroken.org/ .
Altough many of you might have it seen it, to thoes who haven't:
It's is/was an online videozine, dedicated to hacking & cracking and computer related stuff. I encourage you to check out episodes 1 & 3(ep. 2 is more a goof).

The show is starring "The Screensavers'" Kevin Rose and also Double_D. They haven't released an episode for quite some time, I think it's because G4TechTV isn't willing to loan them equimptment like old TechTV did. I heard they were trying to raise money to buy their own stuff, but maybe somebody can tell us a little more about that.

Episode #3 is about password restoring and cracking(using ntpasswd which I pointed out in another thread here), self-destructable laptop, game console hacking and an interview with Kevin Mitnick.

Episode #1 is about social engineering and (the reason I decided to tell you about this show) wireless cracking. (It basicly a simple WarDriving tutorial).

I wanted to get a little "wirless security" comments here. I've heard that MAC address filtering is basicly useless because the MAC address is never encrypted? At what OSI layer does WEP function? Layer 6? And I've also heard that WEP has a bug that sends the WEP key out in cleartext every 10-13MB. Is this true? If so, 64bit is as good as 128bit and only buys us a little time before somebody can access our network.

And also, I've heard that 128 bit and 64 bit WEP encryption isn't actully 128 and 64 but rather 104 bit and 48 bit (or something like that), is that true? If so, why?

With hope to start a fun and informative discussion, MezzUp
More
19 years 9 months ago #6862 by sahirh
I'll shovel this into Security & Firewalls soon,

Quickly though..

WEP works at the data link layer.. which in my opinion is a really bad place to put your security.

MAC addresses can be spoofed fairly easily....

WEP doesn't exactly send out the key in plaintext, but it reuses what are called 'initialisation vectors' which are appended to the key.. which means that if you can get the IV to repeat, you have a very short keylength to crack.... in other words WEP is dead.


more on this in detail later.

Sahir Hidayatullah.
Firewall.cx Staff - Associate Editor & Security Advisor
tftfotw.blogspot.com
More
19 years 9 months ago #6865 by MezzUp

more on this in detail later.

looking forward to it :)
More
19 years 9 months ago #6893 by sahirh
Tell you what, I'll get this guy who works with me to answer this post, he's an 802.11 security wizard, especially with regard to the problems of WEP.

Sahir Hidayatullah.
Firewall.cx Staff - Associate Editor & Security Advisor
tftfotw.blogspot.com
More
19 years 9 months ago #7011 by MezzUp

Tell you what, I'll get this guy who works with me to answer this post, he's an 802.11 security wizard, especially with regard to the problems of WEP.

Not to rush anybody or trying to be impatient, but, have you talked to him? :)
Time to create page: 0.126 seconds