SHARE
Facebook X Pinterest WhatsApp

802.11 Subject to Hacks

Written By
thumbnail
Clint Boulton
Clint Boulton
Feb 26, 2001

The Internet industry Monday learned wireless security protocols are not all that secure, as researchers at the University of California at Berkeley found that hackers could crack the Wired Equivalent Privacy algorithm, part of the 802.11b schema that prevents people from picking up wireless signals.

802.11b is used in home networks, on college campuses, corporate networks and airports — pretty much anywhere a local area network is used.

The team, including two students and two professors, reported their findings on the their computer science department’s Web site and said the code is subject to four types of attacks — one passive, two active and one that builds after a day’s activity.

The researchers found that data could be modified — inserted or deleted — without detection. But what may be most alarming, is that the algorithm may be breached remotely by a perpetrator using a standard computing device, such as a laptop.

WEP is also designed to prevent unauthorized access to a wireless network. The team said WEP relies on a key that is shared between a mobile station (a laptop with a wireless ethernet card) and an access point (ie. a base station). The key encrypts packets before they are transmitted while an integrity check is used to ensure that packets are not modified in transit.

The researches said most organizations use a single key, while more sophisticated key techniques should be employed.

Chris Rouland is director of Internet Security Solutions’ X-Force, a group that specializes in setting up intrusion detection networks for businesses. Rouland, who had seen the Berkeley Web site, told InternetNews.com Monday that it looks as if the researchers were “right on target” with their findings.

“We haven’t seen any tools yet that hackers are using to attack this with yet,” Rouland stressed. “But given the findings I would imagine some people are unplugging their computers today.”

Rouland said the way ISS approaches such a situation is that the Internet is treated as a hostile environment — if something can be done on the Internet it can be done inside corporate networks.

“The risk can be mitigated by setting up 802.11 with a virtual private network on top of it,” Rouland said. “Because physically, the vulnerability is analogous to someone sitting right down at a computer in a company and logging in.”

Rouland said he does not expect a rewrite of the algorithm anytime soon and that corporations may see the VPN as a requirement more so now than ever before.

However, having examined the details dictated by the researchers at Berkeley, Rouland said that his X-Force would be able to identify attack techniques on someone’s network, but admitted that it would be difficult to track down the perpetrators because there is no “latitude or longitude” when someone attacks using a wireless device.

As for the team who made the discovery, he said their efforts are commendable.

“I wonder how long it took them to do it,” Rouland said.

Recommended for you...

Insteon’s Surprise Failure Highlights the Problems with Smart Home Tech
Rob Enderle
Apr 22, 2022
Does Meta Have a Death Wish?
Rob Enderle
Apr 14, 2022
U.S. Needs to Protect Tech Leadership: Qualcomm
Rob Enderle
Apr 8, 2022
Best Internet Security Software
Devin Partida
Mar 23, 2022
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.