02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

What Is a Wireless Network? 357<br />

■<br />

■<br />

■<br />

■<br />

■<br />

■<br />

Its problems arise from the following circumstances:<br />

The protocol was designed without input from the academic community or the public,<br />

and professional cryptologists were never consulted.<br />

It provides no clearly defined method for key distribution other than preshared keys.<br />

As a result the keys are cumbersome to change on a large scale and are very rarely<br />

changed in many cases.<br />

An attacker gaining ciphertext and plaintext can analyze and uncover the key.<br />

Its design makes it possible to passively uncover the key using sniffing tools and<br />

cracking tools available freely in operating systems such as Kali Linux.<br />

Key generators used by different vendors are inconsistently and poorly designed,<br />

leading to vulnerabilities such as issues with the use of 40-bit keys.<br />

The algorithms used to perform key scheduling have been shown to be vulnerable to attack.<br />

WEP Problems and Vulnerabilities<br />

WEP suffers from many flaws that make it easy to compromise by even a slightly skilled<br />

attacker. These flaws are in the following areas:<br />

■ CRC32 (Cyclic Redundancy Check) used in the integrity checking is flawed and with<br />

slight modifications packets may be modified consistently by attackers to produce their<br />

desired results.<br />

■ Initialization vectors (IVs) are only 24 bits in length, meaning that an entire pool of IVs<br />

can be exhausted by a mildly active network in 5 hours or less.<br />

■ WEP is susceptible to known plaintext attacks through the analysis of packets.<br />

■ Keys may be uncovered through the analysis of packets, allowing for the creation of a<br />

decryption table.<br />

■ WEP is susceptible to denial-of-service (DoS) attacks through the use of associate and<br />

disassociate messages, which are not authenticated by WEP.<br />

WEP makes extensive use of initialization vectors. An IV is a randomized<br />

value that is used with the secret key for data encryption purposes. When<br />

these two values are combined, they form a number used once (nonce).<br />

The idea behind using an IV is that through the use of such a mechanism<br />

randomness of data is assured, making detection of patterns or frequency<br />

of data more difficult. However, flaws in the generation of IVs in WEP can<br />

make it vulnerable to analysis and cracking.<br />

Breaking WEP<br />

Undoubtedly you have heard a lot about how poor the WEP protocol is and how you should<br />

not use it. In this section we’ll explain how WEP is broken so you can see the process and<br />

how everything pulls together.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!