We talked about WEP and why it is weak.…Now I'm gonna demonstrate this to you…using Wireshark,…a free protocol analyzer.…I'm not gonna show you how to use Wireshark.…You can visit my course on Wireshark…if you wanna follow the details on that.…For now, I'm gonna go to this website.…A blogger shares his experience…in a challenge in extracting the WEP key.…I downloaded the capture file found here…and we're gonna go into Wireshark and take a look at it.…
Now what we have here is a capture.…I'm gonna go down to the bottom of the screen…and you can see there is a healthy amount…of Packets that are captured.…Now when you do any type of penetration testing…on your network,…there are a plenty of free software tools,…such as Kali Linux or Aircrack…that can be used to recover the WEP key…after intercepting and analyzing…only a small amount of WEP traffic.…Now we're gonna take a look.…As you can see,…we have a lot of captured packets here,…but what I'm gonna go to is frame 30…and I'm just gonna jump to that…and I'm gonna work with this frame…
Author
Released
8/12/2015- Differentiate between confidentiality, integrity, and accountability.
- Compare symmetric and asymmetric encryption.
- Describe the Feistel Cipher.
- Differentiate between block and stream ciphers.
- Explain what Secure Sockets Layer (SSL) is used for.
- Define Internet Protocol Security (IPSec) and explain how it works.
- Explain the transport mode in IPSec.
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Welcome1m 17s
-
-
1. Network Security
-
2. Symmetric Encryption
-
Using Wireshark to crack WEP4m 17s
-
3. Asymmetric Encryption and Digital Signatures
-
Managing keys3m 38s
-
Using certificates3m 3s
-
4. Hash Algorithms, Message Digests, and Authentication
-
5. Secure Sockets Layer (SSL)
-
6. Email Security
-
7. Internet Protocol Security
-
Using operating mechanisms3m 16s
-
Conclusion
-
Next steps55s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Using Wireshark to crack WEP