Hi@ster
Weak IV attack detection: For the data packet of Client1, if the packet uses the WEP encryption algorithm, IV detection is started, and whether a Weak IV attack exists according to the IV security policy. When a packet with a weak initialization vector is detected, it is reported to the AC. IV is a weak vector with a special format. When the plaintext is encrypted with the key generated by it, the encrypted ciphertext has a great relationship with the IV vector. The ciphertext can be cracked by the IV vector, so it has the IV vector The message is insecure and a loophole. Judging method: Weak IV form: (A + 3, N-1, X), A is the byte of the attacked key, N is 256, and X can be any value. Compare the three bytes of the IV. If the first byte is between 3 and 15 and the second byte is 255, it is considered a weak IV.