
Problem Formulation A solution is complete Only if : Solve for all network configurations Key cracking should be done by the time a user finishes sipping a cup of coffee 2 days Open + Static IP 6 days Open + DHCP 1.5 days Shared + Static IP 3 days Shared + DHCP Approximate Cracking time Network ConfigurationĬaffé latte – Shared + DHCP Challenge Enc. Observation #2 Can you force a WEP client connect to a honey pot without having knowledge of the key? Probe Request “Default” Probe Response Authentication Request Authentication Success Association Request Association Response Data DataĬaffé Latte – Attack timelines Every spoofed Association gives us encrypted data packets (either DHCP or ARP) Send a De-auth, process repeats, keep collecting the trace Timelines for cracking the WEP key for various network configurations assuming 500k packets is as follows: 2 days Open + Static IP 6 days Open + DHCP 1.5 days Shared + Static IP 3 days Shared + DHCP Approximate Cracking time Network Configuration Observation #1 Can we somehow have an isolated Client generate WEP encrypted data packets using the authorized network’s key? Default Default Windows caches the WEP key of networks in its PNL To crack WEP all we need is encrypted data packets 80K for PTW attack 500K for KoreK attack It does not matter if these packets come from the AP or the Client
#Caffe latte da cracked#
WEP Attacks – exposure area WEP Attacks Distance from Authorized Network (Miles) 1 On the Moon FMS, Korek PTW No Mutual Authentication Message Modification Message Injection Using known methods, exposure is limited to RF range of WEP enabled network Can your keys be cracked when roaming clients are miles away from the operational network?
#Caffe latte da upgrade#
Recommended users to upgrade to WPA, WPA2 IEEE WG admitted that WEP cannot hold any water.

Now with just around 60,000 – 90,000 packets it is possible to break the WEP key. 2007 – PTW extend Andreas technique to further simplify WEP Cracking. 2005 – Adreas Klein introduces more correlations between the RC4 key stream and the key. We now require only around 500,000 packets to break the WEP key. 2004 – KoreK, improves on the above technique and reduces the complexity of WEP cracking. 2002 - Using the Fluhrer, Mantin, and Shamir Attack to Break WEP A. 2001 - Weaknesses in the key scheduling algorithm of RC4.


Vivek Ramachandran MD Sohail Ahmad Caffé Latte with a Free Topping of Cracked WEP Retrieving WEP Keys From Road-WarriorsĬracks in WEP - Historic Evolution 2001 - The insecurity of 802.11, Mobicom, July 2001 N.
