Although WEP is one of the most talked-about means of protection for a wireless net, it will not by itself make your network secure. |
Three chapters describe distinguisher attacks on RC4, WEP protocol attacks, and fault attacks. |
Both WEP and WPA-PSK use a key that is susceptible to offline brute-force dictionary attacks. |