Network encryption cracking: Difference between revisions

Content deleted Content added
No edit summary
destub
 
(6 intermediate revisions by 5 users not shown)
Line 1:
{{Short description|Method for breaching computer network security}}
{{RefimproveMore citations needed|date=October 2008}}
{{Multiple issues|
{{Refimprove|date=October 2008}}
{{essay|date=August 2018}}
}}
 
'''Network encryption cracking''' is the breaching of network encryptions (e.g., WEP, WPA, ...), usually through the use of a special [[Wireless security|encryption cracking software]]. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and [[Dictionary attack|dictionary-based attacks]].
Line 35 ⟶ 33:
</syntaxhighlight>
 
This command asks WEPCrack to determine the key from the log file.<ref>{{Cite book |lastlast1=Beaver |firstfirst1=Kevin |title=Hacking Wireless Networks For Dummies |last2=Davis |first2=Peter |publisher=[[For Dummies]] |year=2005 |isbn=978-0764597305 |edition=1st}}</ref>
 
====AirCrack====
Line 43 ⟶ 41:
 
====AirSnort====
AirSnort is a software program that passively collects traffic on an [[IEEE 802.11b]] network that was released in August 2001.<ref>{{Cite magazine |last=Delio |first=Michelle |title=Wireless Networks in Big Trouble |language=en-US |magazine=[[Wired (magazine)|Wired]] |url=https://www.wired.com/2001/08/wireless-networks-in-big-trouble/ |access-date=2023-01-16 |issn=1059-1028}}</ref> After enough packets have been collected, the program can then compute the key for the wireless network. As the software makes use of brute-force attack however, cracking the encryption can take between a few hours to several days, based on the activity on the network.<ref>{{Cite web |title=AirSnort pokes holes in AirPort network security |url=https://www.macworld.com/article/162585/airsnort.html |access-date=2023-01-16 |website=Macworld |language=en}}</ref>
 
==References==
Line 53 ⟶ 51:
[[Category:Computer network security]]
[[Category:Wireless networking|Security]]
 
{{Network-stub}}