fragmentation
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
fragmentation [2007/05/25 00:00] – add alternate attack methods darkaudax | fragmentation [2007/06/25 16:33] – corrected broken links darkaudax | ||
---|---|---|---|
Line 8: | Line 8: | ||
Basically, the program obtains a small amount of keying material from the packet then attempts to send ARP and/or LLC packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | Basically, the program obtains a small amount of keying material from the packet then attempts to send ARP and/or LLC packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | ||
- | The original paper by Andrea Bittau at http://www.toorcon.org/2005/ | + | The original paper, [[http://darkircop.org/bittau-wep.pdf|The Fragmentation Attack in Practice]], by Andrea Bittau |
===== Usage ===== | ===== Usage ===== |
fragmentation.txt · Last modified: 2009/09/05 23:32 by mister_x