Got it

what does AC6605 weak-iv attack detection mean?

Created: Dec 28, 2019 07:04:55Latest reply: Dec 28, 2019 07:09:47 409 2 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

Hi,all

attack detection enable {all | flood | weak-iv | spoof | wpa-psk | wpa2-psk | wapi-psk | wep-share-key}

weak-iv Specifies to enable weak vector attack detection.

What is this weak-iv attack detection? thanks


Featured Answers
jason_hu
Admin Created Dec 28, 2019 07:06:11

Hi@ster

Weak IV attack detection: For the data packet of Client1, if the packet uses the WEP encryption algorithm, IV detection is started, and whether a Weak IV attack exists according to the IV security policy. When a packet with a weak initialization vector is detected, it is reported to the AC. IV is a weak vector with a special format. When the plaintext is encrypted with the key generated by it, the encrypted ciphertext has a great relationship with the IV vector. The ciphertext can be cracked by the IV vector, so it has the IV vector The message is insecure and a loophole. Judging method: Weak IV form: (A + 3, N-1, X), A is the byte of the attacked key, N is 256, and X can be any value. Compare the three bytes of the IV. If the first byte is between 3 and 15 and the second byte is 255, it is considered a weak IV.

View more
  • x
  • convention:

All Answers

Hi@ster

Weak IV attack detection: For the data packet of Client1, if the packet uses the WEP encryption algorithm, IV detection is started, and whether a Weak IV attack exists according to the IV security policy. When a packet with a weak initialization vector is detected, it is reported to the AC. IV is a weak vector with a special format. When the plaintext is encrypted with the key generated by it, the encrypted ciphertext has a great relationship with the IV vector. The ciphertext can be cracked by the IV vector, so it has the IV vector The message is insecure and a loophole. Judging method: Weak IV form: (A + 3, N-1, X), A is the byte of the attacked key, N is 256, and X can be any value. Compare the three bytes of the IV. If the first byte is between 3 and 15 and the second byte is 255, it is considered a weak IV.

View more
  • x
  • convention:

thanks for your prompt reply@jason_hu
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.