Network encryption cracking: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: template type. Add: magazine, authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Abductive | #UCB_webform 3386/3850
Line 35:
</syntaxhighlight>
 
This command asks WEPCrack to determine the key from the log file.<ref>{{Cite book |lastlast1=Beaver |firstfirst1=Kevin |title=Hacking Wireless Networks For Dummies |last2=Davis |first2=Peter |publisher=[[For Dummies]] |year=2005 |isbn=978-0764597305 |edition=1st}}</ref>
 
====AirCrack====
Line 43:
 
====AirSnort====
AirSnort is a software program that passively collects traffic on an [[IEEE 802.11b]] network that was released in August 2001.<ref>{{Cite newsmagazine |last=Delio |first=Michelle |title=Wireless Networks in Big Trouble |language=en-US |workmagazine=[[Wired (magazine)|Wired]] |url=https://www.wired.com/2001/08/wireless-networks-in-big-trouble/ |access-date=2023-01-16 |issn=1059-1028}}</ref> After enough packets have been collected, the program can then compute the key for the wireless network. As the software makes use of brute-force attack however, cracking the encryption can take between a few hours to several days, based on the activity on the network.<ref>{{Cite web |title=AirSnort pokes holes in AirPort network security |url=https://www.macworld.com/article/162585/airsnort.html |access-date=2023-01-16 |website=Macworld |language=en}}</ref>
 
==References==