Although most providers and users today are using WPA2 encryption, there are still a lot of users that set their wireless network with WEP security (Wired Equivalent Privacy). It is estimated that the amount of WEP-users correlate with the number of Swedish people in the world (not really, that was a “svenskevits”).
WEP is considered to be very insecure, and in most cases it can be cracked very easily. In my review here I do not included attacks that are also commonly used also for attacking WPA2, since it is not encryption specific.
One of the methods is ofcourse to do a Brute Force attack. WEP encryption is weak by nature, and on Wikipedia you can read that “Standard 64-bit WEP uses a 40 bit key (also known as WEP-40), which is concatenated with a 24-bit initialization vector (IV) to form the RC4 key” (Wikpedia, 2017). This means that with such a short bit key, the amount of time to guess the answer will not be too long.
There are also other methods of cracking the WEP, and some of these methods are explained on this site named after the Swedes 🙂
If you want to attack WPA/WPA2 – I can also recommend trying this method called “Evil Twin”. Here with a video using Linset on Kali Linux. Which is very similar to the MITM-attack I wrote about earlier.
Wikipedia (2017) Wired Equivalent Privacy
Available at: https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy
Accessed: 09 March 2017