What Is A Wep Key; A Wep Key Is A User Defined String Of Characters Used To Encrypt And Decrypt Data; Can The Ssid Be Encrypted; By Turning Off The Broadcast Of Ssid, Can Someone Still Sniff The Ssid - ZyXEL Communications P-2812HNU-51c Support Notes

Dual wan vdsl2 iad with 802.11n wireless
Hide thumbs Also See for P-2812HNU-51c:
Table of Contents

Advertisement

P-2812HNU-51C Support Notes

What is a WEP key?

A WEP key is a user defined string of characters used to encrypt and decrypt data.

A WEP key is a user defined string of characters used to encrypt and decrypt data?
128-bit WEP will not communicate with 64-bit WEP or 256-bit WEP Although 128 bit
WEP also uses a 24 bit Initialization Vector, but it uses a 104 bit as secret key. Users
need to use the same encryption level in order to make a connection.

Can the SSID be encrypted?

WEP, the encryption standard for 802.11, only encrypts the data packets not the
802.11 management packets and the SSID is in the beacon and probe management
messages. The SSID is not encrypted if WEP is turned on. The SSID goes over the air
in clear text. This makes obtaining the SSID easy by sniffing 802.11 wireless traffic.

By turning off the broadcast of SSID, can someone still sniff the SSID?

Many APs by default have broadcasting the SSID turned on. Sniffers typically will find
the SSID in the broadcast beacon packets. Turning off the broadcast of SSID in the
beacon message (a common practice) does not prevent getting the SSID; since the
SSID is sent in the clear in the probe message when a client associates to an AP, a
sniffer just has to wait for a valid user to associate to the network to see the SSID.

What are Insertion Attacks?

The insertion attacks are based on placing unauthorized devices on the wireless
network without going through a security process and review.

What is Wireless Sniffer?

An attacker can sniff and capture legitimate traffic. Many of the sniffer tools for
Ethernet are based on capturing the first part of the connection session, where the
data would typically include the username and password. An intruder can
masquerade as that user by using this captured information. An intruder who
monitors the wireless network can apply this same attack principle on the wireless.
All contents copyright (c) 2009 ZyXEL Communications Corporation.

Advertisement

Table of Contents
loading

Table of Contents