Weplab

Weplab

Infobox Software
name = weplab


caption = weplap 0.1.5
developer = José Ignacio Sánchez Martín
latest_release_version = 0.1.5
latest_release_date = July 18, 2005
operating_system = Cross-platform
genre = Packet Sniffer
license = GPL
website = [http://weplab.sourceforge.net/ weplab.sourceforge.net]

Weplab is a tool designed to teach how the Wired Equivalent Privacy (WEP) wireless encryption protocol works, explain the security vulnerabilities in the protocol, and demonstrate attacks that can be used to compromise a WEP protected wireless network. Weplab is designed not only to crack WEP keys but to analyze the wireless security of a network from an educational point of view. The author has attempted to make the source code as clear as possible, instead of implementing optimizations that would obfuscate it.

Features

Weplab tries to break the WEP key using several known attacks:

* attempting to brute force the key
* loading a list of words or passphrases and trying each one in plain or MD5 form. Weplab relies on John The Ripper to generate the word list.
* using the FMS attack, but with some differences. Unlike traditional implementations of the FMS attack, Weplab tests all initialization vectors to determine whether they are weak, and it attacks both the first and the second bytes. More recent versions of Weplab also include the newer Korek's attacks; with these attacks it is possible to crack a 64-bit key after collecting only 100,000 packets, or crack a 128-bit key after collecting 300,000 packets.

External links

* [http://weplab.sourceforge.net/ Official webpage]


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Network encryption cracking — is the breaching of network encryptions (e.g., WEP, WPA, ...), usually through the use of a special encryption cracking software. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and… …   Wikipedia

  • Атака на основе шифротекста — Атака на основе шифртекста (англ. Ciphertext only attack )  один из основных способов криптоатак. Предполагается что криптоаналитику известен только набор шифртекстов, целью является получение как можно большего количества открытых… …   Википедия

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”