Not "everyone" knows that.  Some of us do... certainly those of us in the
Wi-Fi community.  But most internet users do not know anything about
wireless security, be it WEP, WPA, IPSEC, ABCDEFG, or anything.  These are
the real plug-and-play people.

What this article and demo is pointing out is that WEP is so fluid, that
it's not really safe for anything except a speedbump in the parking lot of
wireless intrusion.  The more people know that, one would hope, the less
crimes of convenience there will be.

But in 4 years of Wi-Fi data, we still are seeing only about one-third of
wireless networks are using any security.  So for you top-tier, 98th
percentile folks who know how to lock down a Wi-fi network, there's still a
need for you.

-Mike




-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of Thomas Maguire
Sent: Tuesday, April 05, 2005 3:19 PM
To: [email protected]
Subject: Re: [SOCALWUG] The Feds can own your WLAN too


But like WEP is a useless protocol; everyone knows that?
That has been known forever.
????


----- Original Message -----
From: "Mike Outmesguine" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Tuesday, April 05, 2005 3:08 PM
Subject: [SOCALWUG] The Feds can own your WLAN too


> [Los Angeles FBI agents attend SOCALWUG meetings to stay on top of what's
> really going on in the wireless space.  It's great to see their wireless
> experience carrying over to the general IT security community.  -Mike O.]
>
>
> From slashdot:
> http://hardware.slashdot.org/article.pl?sid=05/04/05/1428250
> Feds Hack Wireless Network in 3 Minutes
> Posted by CmdrTaco on Tuesday April 05, @12:26PM
> from the still-can't-balance-budget dept.
>
> xs3 writes "At a recent ISSA (Information Systems Security Association)
> meeting in Los Angeles, a team of FBI agents demonstrated current
> WEP-cracking techniques and broke a 128 bit WEP key in about three
minutes.
> Special Agent Geoff Bickers ran the Powerpoint presentation and explained
> the attack, while the other agents (who did not want to be named or
> photographed) did the dirty work of sniffing wireless traffic and breaking
> the WEP keys. This article will be a general overview of the procedures
used
> by the FBI team."
>
>
> Here's the Tom's Hardware article by Humphrey Cheung:
> http://www.tomsnetworking.com/Sections-article111.php
>
>
>

Reply via email to