OK, just been doing a bit of messing with gentoo, madwifi-ng and aircrack and its all a bit scary for anyone still using WEP to protect well anything really
I use WPA2 on my home network, but have a spare BT Homehub not currently in use. As it supports both 40 and 104 bit WEP it was a prime candidate for this test. This was an active attack using spoofed ARPs to generate traffic and speed the process of data collection up. However the rate of ARPs was throttled so that the legit client wasn't noticeably affected. If I'd gone at it full tilt, data collection would have been even quicker.
Bottom line was that 40 bit WEP was cracked in 20 mins, after taking about an hour to collect sufficient unique IVs (crypto stuff from the raw data). 104 bit took approx 4 times longer, taking about 4 hours to collect 1.2M IVs and about 90mins to crack. I used the same PC to crack as was used to collect/spoof data, and for comparison its a P4 2.4 with 512M RAM. The arp flooding was left running while the crack itself ran, so the actual number of IVs analysed was higher by the time the crack completed than quoted above.
These were pseudo-random hex keys (actually random chunks out of various md5 checksums in my DVD collection)
MAC filtering is NOT a protection, a properly setup cracking PC can spoof source mac addresses no problem. All a cracker would need to do is wait until a legit client appears, note their mac address and use it to pretend to be them once they've logged out.
[Most of the post up to here is detailed for the curious & IT savvy reader and may sound like techno-babble to many non IT bods
The important bit to remember is that the strongest possible WEP security was cracked within 5 hours using consumer grade equipment]
Now these attacks (and the vulnerabilities with WEP that enable them to work) have been known for a while and what I'm saying won't come as a surprise to anyone with an interest in IT security. When I had a sniff around where I live I was gob-smacked to notice the high proportion of Wifi LANs running WEP (at least they weren't open, even though they might as well have been) This suggests the message regarding WEP either hasn't got through to the general public, or where it has its being ignored
AFAIK WPA & WPA2 are both currently only susceptible to dictionary attacks. If you don't use English dictionary words modified in any systemic way to create your pre shared key you should be fine.
You can use a site like this one to assist with generating random binary keys, just remember not to use them with WEP
I use WPA2 on my home network, but have a spare BT Homehub not currently in use. As it supports both 40 and 104 bit WEP it was a prime candidate for this test. This was an active attack using spoofed ARPs to generate traffic and speed the process of data collection up. However the rate of ARPs was throttled so that the legit client wasn't noticeably affected. If I'd gone at it full tilt, data collection would have been even quicker.
Bottom line was that 40 bit WEP was cracked in 20 mins, after taking about an hour to collect sufficient unique IVs (crypto stuff from the raw data). 104 bit took approx 4 times longer, taking about 4 hours to collect 1.2M IVs and about 90mins to crack. I used the same PC to crack as was used to collect/spoof data, and for comparison its a P4 2.4 with 512M RAM. The arp flooding was left running while the crack itself ran, so the actual number of IVs analysed was higher by the time the crack completed than quoted above.
These were pseudo-random hex keys (actually random chunks out of various md5 checksums in my DVD collection)
MAC filtering is NOT a protection, a properly setup cracking PC can spoof source mac addresses no problem. All a cracker would need to do is wait until a legit client appears, note their mac address and use it to pretend to be them once they've logged out.
[Most of the post up to here is detailed for the curious & IT savvy reader and may sound like techno-babble to many non IT bods
The important bit to remember is that the strongest possible WEP security was cracked within 5 hours using consumer grade equipment]Now these attacks (and the vulnerabilities with WEP that enable them to work) have been known for a while and what I'm saying won't come as a surprise to anyone with an interest in IT security. When I had a sniff around where I live I was gob-smacked to notice the high proportion of Wifi LANs running WEP (at least they weren't open, even though they might as well have been) This suggests the message regarding WEP either hasn't got through to the general public, or where it has its being ignored

AFAIK WPA & WPA2 are both currently only susceptible to dictionary attacks. If you don't use English dictionary words modified in any systemic way to create your pre shared key you should be fine.
You can use a site like this one to assist with generating random binary keys, just remember not to use them with WEP




