WEP cracked in practice
AirSnort is the practical-public WEP-key recovery tool I predicted in my January list. Six weeks of testing has confirmed it works. A walk through what changes for wireless deployments.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged wireless — 3 results.
AirSnort is the practical-public WEP-key recovery tool I predicted in my January list. Six weeks of testing has confirmed it works. A walk through what changes for wireless deployments.
I picked up a wireless card and spent a weekend learning what an attacker actually sees on a wireless network. The toolchain is rough; the results are sobering. A first writeup before next year's WEP analysis becomes routine.
802.11b wireless equipment has dropped in price enough that I am seeing it deployed casually. The security model is fragile in ways that the marketing material does not mention. A first-pass survey of what defenders need to know.