From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Understanding wireless encryption

Understanding wireless encryption

From the course: Certified Ethical Hacker (CEH)

Understanding wireless encryption

- As I mentioned in the previous lesson, it's rare, it's not exactly rare, but you're often going to see encryption implemented on networks, wireless networks. The open networks are generally going to have something else in the way. Getting onto an open unencrypted wireless network that has zero access control is rare. So these networks that have encryption implemented are usually using one of these protocols here: WEP WPA, WPA2, TKIP, AES, EAP, LEAP, RADIUS, and CCMP. So let's talk about this stuff. WEP is Wired Equivalent Privacy, came out in the original standard 802.11 in 1997. It used the RC4 Stream Cipher, and there was a 50% chance that an initialization vector would be repeated in 4,000 frames. If there's not enough traffic to capture that initialization vector overlap, you can inject traffic in order to cause an initialization vector collision. With that collision, you can then brute force the passphrase in order to access that network. And then in 2003, we realized that WEP…

Contents