From: Cesar Diaz (cesadiz@yahoo.com)
Date: Sat Oct 04 2003 - 21:16:08 EDT
Due to our industry and business requierements, we have to document every process and method used to access our data and prove that we've tested the security of our data.In order to let the users go wireless I have to show that I've tested the security on a wireless network.
Our idea is to let the users buy wireless routers to connect to their cable/dsl routers and then wireless PCMCIA or USB cards on the laptop. We would implement 128 bit WEP security to prevent unauthorized access. I realize that WEP does not provide for stringent security, but we feel that by forcing users to change their WEP key regularly we can meet our requierements.
My question is, how do I test WEP and document wether or not it's secure? Any way to sniff for WEP keys, or to brute force attack a WEP session? If there is, how hard is it to set up? How much of a risk of a wireless connection with WEP enabled to be comprimised other than a dedicated, brute force attack?
Any information is greatly appreciated.
Cesar
---------------------------------------------------------------------------
Tired of constantly searching the web for the latest exploits?
Tired of using 300 different tools to do one job?
Get CORE IMPACT and get some rest.
www.coresecurity.com/promos/sf_ept2
----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:40 EDT