This is all well and good, but checksum has its flaws as well. What we mean is that checksumming distributes over the XOR operation. This is a general property of all CRC checksums. One consequence is that it becomes possible to make controlled modifications to a ciphertext without disrupting the checksum. Also the checksum is unkeyed, therefore allowing anyone to change the message. Another flaw of WEP allows for IP redirection. This allows the hacker to easily modify the destination IP address. Figuring out the original destination IP address is usually not difficult; all of the incoming traffic, for example, will be destined for an IP address on the wireless subnet. Once the incoming traffic is decrypted, the IP addresses of the other ends of the connections will be revealed, and outgoing traffic can then be decrypted in the same manner.
Wireless LANSs are easy to find. They enable clients to find them by transmitting Beacon frames with network parameters. This also allows hackers to launch an attack on a network, because the Beacon frames are not processed by any privacy functions, which means that the 802.11 network is available for anybody with an 802.11 card. Hackers with high-gain antennas can find networks from nearby roads or buildings and launch attacks without physically having …show more content…
They are more worried about extending the range for cell phones and power saving. Companies should be more alert because the rises of the hackers are rising fast. This could be trouble in the future because us as humans don’t react to a problem until it actually happens. For example, September 9, 2001 when the terrorist attack happened, we change our airports and made them more secure. They should have been very secure in the first place so that never happened. That’s what is going to happen with hacking. Someone is going to hack into the government and steal tons of money and we won’t have any way to stop it. People need to start planning for this until it really gets out of