|
|
O/S/M Vulnerabilities
Open authentication vulnerabilities - no way for the the AP to determine whether a client is valid or not (WEP encryption should be always implemented)
Shared key authentication vulnerabilities - requires the client use a preshared WEP key. An attacker can capture both the plain-text challenge text and the cipher-text response and performs an exclusive (XOR) function on the plain-text with the cipher-text to produce the key stream
MAC address authentication vulnerabilities - an attacker can subvert the MAC authentication process by "spoofing" valid MAC address
|