05-06-2003 09:13 PM - edited 07-04-2021 08:41 AM
I just read a brief reference to a 3rd Party Company hired to crack TKIP and MIC using passive & inductive hacking methods that were used to crack WEP. The tests came back that Cisco enhancements were solid and couldn't be cracked. Can anyone please supply more information on this - the Company that did the testing, a link to a report detailing test methodology and results etc?
05-06-2003 09:39 PM
Although I dont have the exact test methodology etc for you this site here will show the major studies that have been down and how the enhancements will block these attempts
It shows many stories from NON Cisco sources such as ZDnet and industry magazines on this subject
http://www.cisco.com/warp/public/779/smbiz/wireless/wlan_security.shtml/
05-12-2003 11:25 AM
Please share with us the article!
TKIP+MIC may as well harder to crack than 3DES VPN, but there is remaining one weakness: clear text username for RADIUS authentication. I hope Cisco will move to TACACS+ soon.
http://wlanresearch.com/LEAPVPN.htm
Audie
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide