Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: Perpetuating weak wireless security
May 09 2007 09:44PM
Nico Darrow (ndarrow airdefense net)
Hey Nick, glad to have you at our HQ ;-P
1) Great question. What we are doing with WEP Cloaking is removing all
the shortcuts available to the attacker and forcing him/her to use the
worst possible case scenario (brute forcing). Hence why we named it
WepCloaking instead of WepShield ;-P
2) I agre...
[ more ]
Copyright 2010, SecurityFocus