And here is the second and concluding part of Tom's network's
step-by-step guide (
print) explaining how even non-hackers can break the WEP encryption that is still so commonly used in WiFi networks.
While the
first part focused on sniffing and attacking computers, this part shows you how to actually capture and crack the WEP key. It also describes how to use deauthentication and packet replay attacks to stimulate the generation of wireless traffic that is a key element of reducing the time it takes to perform a WEP key crack.
I cannot repeat often enough: make sure to upgrade your WiFi network at home and in your office to use WPA encryption. WEP is dead!