2
WPA is vulnerable to deauth attacks. But what about WEP?
I know WEP has a whole bunch of other issues... But right now, my issue is staying connected.
2
WPA is vulnerable to deauth attacks. But what about WEP?
I know WEP has a whole bunch of other issues... But right now, my issue is staying connected.
2
Neither WPA nor WEP encrypts management frames, so deathentication attacks are trivial under both standards. The 802.11w standard protects management frames, but is far from universally implemented: http://en.wikipedia.org/wiki/IEEE_802.11w-2009
1
You are confusing WEP and WPA. WEP is the one that is most vulnerably to deauths, and a whole assortment of other attacks.
WPA is way better, but still somewhat vulnerable to deauths.
yeah, under the right conditions, WEP can be cracked in < 1 minute. – NullVoxPopuli – 2010-11-30T20:05:40.520
but with WPA, deauth attacks disconnect the clients, so that when they reconnect, the attacker can collect handshake data. So my question is if WEP has some vulnerability, similar to WPA, in which an attacker can deauthenticate clients from the router. – NullVoxPopuli – 2010-11-30T20:06:57.427
@Der, note the "edit" link underneath your question! ;-) – Arjan – 2010-11-30T20:08:47.940
from my experience it it much easier to deauth WEP than it is for WPA – madmaze – 2010-11-30T20:14:12.773
1deauth, here means that clients are disconnected. Like.. I know that wep is suer easy to hack. @madmaze, is that what you mean? or does that mean that someone could forge a deauth packet, and have the clients disconnect from the router? – NullVoxPopuli – 2010-11-30T21:55:22.277
Are you sure you didn't confuse WEP with WPA on vulnerabilities? – Benjamin Bannier – 2010-11-30T19:57:59.710
@honk, no. PSK in WPA and WPA2 is targeted with de-authentication. The question is: does WEP suffer this as well? – Arjan – 2010-11-30T19:59:59.043
As an aside, as WEP is easier to hack into: if, when using WEP, you are no longer suffering the deauth attacks, then that might actually imply that someone succeeded in accessing your network? (And hence has no need for sending the deauth requests any longer...?) – Arjan – 2010-12-01T17:10:42.960