BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-81 Topic 14 Question 28 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 28
Topic #: 14
[All 212-81 Questions]

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Show Suggested Answer Hide Answer
Suggested Answer: A

Wired Equivalent Privacy (WEP)

https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Weak_security

In 2007, Erik Tews, Andrei Pychkine, and Ralf-Philipp Weinmann were able to extend Klein's 2005 attack and optimize it for usage against WEP. With the new attack it is possible to recover a 104-bit WEP key with probability 50% using only 40,000 captured packets. For 60,000 available data packets, the success probability is about 80% and for 85,000 data packets about 95%. Using active techniques like deauth and ARP re-injection, 40,000 packets can be captured in less than one minute under good conditions. The actual computation takes about 3 seconds and 3 MB of main memory on a Pentium-M 1.7 GHz and can additionally be optimized for devices with slower CPUs. The same attack can be used for 40-bit keys with an even higher success probability.


Contribute your Thoughts:

Lennie
5 months ago
I remember studying about this in my security class. It's definitely WPANina.
upvoted 0 times
...
Ryan
5 months ago
I agree with user Nina, WPANina is the correct answer here.
upvoted 0 times
...
Nina
5 months ago
No, I believe it is WPANina because of its vulnerability to packet capturing.
upvoted 0 times
...
Yuki
5 months ago
I think the algorithm mentioned in the question is WEP.
upvoted 0 times
...
Kyoko
6 months ago
I disagree, WPAKanisha was the one that replaced WEP because of its security vulnerabilities.
upvoted 0 times
...
Stefania
6 months ago
I feel like the answer might actually be WPA.
upvoted 0 times
...
Kanisha
6 months ago
I agree, WEP was definitely the algorithm that was easily hacked in Kanisha007.
upvoted 0 times
...
Corazon
6 months ago
I think the algorithm referred to in the question is WEP.
upvoted 0 times
...

Save Cancel