What are some of the tools used to perform WEP attacks?

What will be an ideal response?


WEP attacks can be performed through any one of a number of tools that are freely available on the Internet. Some of the best known include AirSnort, Aircrack, ChopChop WEP Cracker, and WEP Crack. However, these tools require a certain degree of computer experience to use. Only certain wireless NIC adapter cards with specific drivers can be used, and almost all of these tools were developed under the Linux operating system and are designed to function under Linux. Although a few of these tools have been ported to the Windows operating system, they require special supporting software packages to properly function. Also, the length of time needed to capture enough packets to break WEP can be several (5 to 7) hours, depending on the volume of traffic.

Computer Science & Information Technology

You might also like to view...

Which of the following is the correct way to declare a variable that represents if an order has been canceled?

a. BOOLEAN canceled = false; b. boolean canceled = false; c. boolean CANCELED = false; d. boolean canceled = FALSE;

Computer Science & Information Technology

____ refers to the level at which you can see through a color to reveal the layer beneath it.

a. Pixel b. Saturation c. Opacity d. Blocking

Computer Science & Information Technology

public static int func2(int m, int n){    if (n == 0)        return 0;    else        return m + func2(m, n - 1);}Which of the following statements about the code in the accompanying is always true?

A. func2(m, n) = func2(n, m) for m >= 0 B. func2(m, n) = m * n for n >= 0 C. func2(m, n) = m + n for n >= 0 D. func2(m, n) = n * m for m >= 0

Computer Science & Information Technology

The endnotes line can be removed from a document

Indicate whether the statement is true or false

Computer Science & Information Technology