Wireless LAN Security II: WEP Attacks, WPA and WPA2
Wireless LAN Security II: WEP Attacks, WPA and WPA2
Wireless LAN Security II: WEP Attacks, WPA and WPA2
WEP Attacks,
WPA and WPA2
Raj Jain
Washington University in Saint Louis
Saint Louis, MO 63130
Jain@cse.wustl.edu
Audio/Video recordings of this lecture are available at:
http://www.cse.wustl.edu/~jain/cse571-09/
Washington University in St. Louis CSE571S ©2009 Raj Jain
20-1
Overview
Yes
Ping Response OK?
No
Packet silently dropped
Washington University in St. Louis CSE571S ©2009 Raj Jain
20-10
Reuse IV Attack
If you have keystream for a particular IV, you can
keep using the same IV for which you have keystream
Hash
IV Packet Key
RC4 RC4
0x00 0x5A
SA DA Res Pri MAC User Data Stop Pad MIC
48b 48b 24b 8b 8b
MPDU ICV
Encryption Key
xor
E E E … E E AES Encryption
… Cipher text
MAC