Тёмный

Security + 1.2 Wireless Attacks WEP & IV 

Cyber-Recon
Подписаться 4,4 тыс.
Просмотров 9 тыс.
50% 1

Wireless devices are all around you make sure you're prepired for a wireless attack. in this video we will cover the basics and get you on track.
Join us as we take the month of April 2020 to prepare you for the Security+ exam in these videos were going to break down everything you're going to need to know to get your CompTIA certification.

Наука

Опубликовано:

 

5 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 25   
@dhruvbhatia
@dhruvbhatia 3 года назад
This is the best explanation of WEP and its security issues on youtube. Thank you
@Cyber-recon
@Cyber-recon 3 года назад
Thank you - I appreciate it! I hope that you were able to subscribe to the channel and hit that bell to be notified when we go live or post new videos
@DEMIntern
@DEMIntern 4 месяца назад
Thank you for explaining this simply. I've got a better grasp of what makes WEP such a security risk now.
@lupoi14
@lupoi14 Год назад
holy smokes finally somebody explains normally and visually. I appreciate the information you are a very good teacher
@Cyber-recon
@Cyber-recon 7 месяцев назад
Thank you - I appreciate your comment!
@ericchifumpu9627
@ericchifumpu9627 2 года назад
Clear and cleanest explanation, even my grandma would understand this. Thank you!!
@Cyber-recon
@Cyber-recon 2 года назад
Thank you - I am glad it helped
@rickromero2990
@rickromero2990 Год назад
Awesome explanation of WEP !!
@Cyber-recon
@Cyber-recon 7 месяцев назад
Thank you!
@JenipherCyberSecurity
@JenipherCyberSecurity 3 года назад
Best explanation I have seen on WEP. Thank you.
@Cyber-recon
@Cyber-recon 2 года назад
Glad it was helpful!
@sorin5454
@sorin5454 3 года назад
OMG almost the best explanation on youtube thanks a lot !!
@Cyber-recon
@Cyber-recon 3 года назад
Glad it helped! I hope that you were able to subscribe to the channel and hit that bell to be notified when we go live or post new videos!
@mind-blowing6286
@mind-blowing6286 2 года назад
The best video explanation of WEP. Thank you so much
@Cyber-recon
@Cyber-recon 7 месяцев назад
Thank you!
@shubhampaul8394
@shubhampaul8394 3 года назад
thankyou soo much sir best explanation ever...🙂
@Cyber-recon
@Cyber-recon 3 года назад
So nice of you, I really appreciate that, if it helped I hope you subscribed and hit that bell to be notified of when we go live or post new videos.
@agentfourteen8574
@agentfourteen8574 3 года назад
THANK YOU SO MUCH
@Cyber-recon
@Cyber-recon 2 года назад
Thank you - I hope it helps
@CanCaner163
@CanCaner163 Год назад
is the crc32 also xor ed with the keystream ? or is it conducted after XOR operation ? Thank you in advance
@Cyber-recon
@Cyber-recon 7 месяцев назад
Hey there, thanks for your question about CRC32 and XOR operations. It's great to see interest in the technical details of data processing and cryptography! To clarify your question: CRC32, which stands for Cyclic Redundancy Check 32, is a checksum algorithm used to detect errors in data. When it comes to combining CRC32 with a keystream (like in stream ciphers or other cryptographic operations), the order and method of application can vary depending on the specific protocol or system design. In some cases, the CRC32 might be calculated first on the original data, and then the result is XORed with the keystream. In other scenarios, the data might be XORed with the keystream first, and then the CRC32 is calculated on the resultant data. The approach depends on what the system is designed to achieve - whether it's prioritizing integrity checks, encryption, or both. Remember, the key thing about CRC32 is that it's used for error-checking and not encryption. So, if it's combined with a keystream for encryption purposes, the overall security and functionality will depend on how these operations are integrated and implemented. Thanks again for your question! If anyone else has insights or further queries on this topic, feel free to join the discussion. It's always exciting to delve into the technical side of things!
@Chatbot121
@Chatbot121 3 года назад
How does a repeated IV make it easier to find the key. What can the attacker do with two sequences of data, given they have the same IV?
@AshishBadhani-lk8ut
@AshishBadhani-lk8ut 3 года назад
IV is added in the plain text along with the final o/p cyphertext.
@sreejishnair5922
@sreejishnair5922 2 года назад
But can anyone clear this why we need more number if IVs to break the key? Everybody just says that we need more number of IVs but why we need that much, what's the difference between analyzing one packet comparing to an n number of packets?
@Cyber-recon
@Cyber-recon 7 месяцев назад
Great question! Understanding why a large number of Initialization Vectors (IVs) is required to break WEP encryption is key to grasping the weaknesses in WEP. WEP (Wired Equivalent Privacy) encryption is vulnerable largely because of the way it uses IVs. IVs are meant to add randomness to the encryption key used for each packet. However, in WEP, the IVs are short (24 bits) and are transmitted in plain text. This short length means that IVs are reused with the same key, leading to vulnerabilities. When you analyze just one packet, you only get a small glimpse into the encryption pattern. Since WEP reuses IVs, the more packets you analyze, the more likely you are to encounter repeated IVs. These repetitions, when analyzed together, reveal patterns that can be exploited to crack the encryption key. In simpler terms, think of each packet as a piece of a puzzle. One piece doesn't tell you much, but the more pieces you have, the clearer the picture becomes. In the case of WEP, collecting a large number of packets (and therefore IVs) allows a hacker to put together enough of the puzzle to figure out the encryption key. This inherent flaw in WEP's design is why it's considered insecure and has been largely replaced by more secure encryption methods like WPA2 and WPA3. Thanks for your insightful question! If anyone else has thoughts or additional explanations, feel free to chime in!
Далее
Wireless Authentication and Key Generation
23:37
Просмотров 90 тыс.
3 Levels of WiFi Hacking
22:12
Просмотров 1,8 млн
Schoolboy - Часть 2
00:12
Просмотров 4,1 млн
KRACK - The Details and the Reality
29:58
Просмотров 10 тыс.
Wireless (WiFi) Frames - Three Types to Understand
8:33
CMPS 485: WEP Cracking Theory
18:28
Просмотров 1,4 тыс.
CS4538: Weaknesses in the RC4 Key Scheduling Algorithm
28:42
Transport Layer Security (TLS) - Computerphile
15:33
Просмотров 474 тыс.
Hunt Down & Crack WEP Wi-Fi Networks [Tutorial]
8:50
ARP poisoning and Port mirroring attacks
9:58
Просмотров 7 тыс.
WiFi Security: What is WEP, WPA, and WPA2
6:39
Просмотров 34 тыс.
КРУТОЙ ТЕЛЕФОН
0:16
Просмотров 7 млн