Description: Welcome to Part 16 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will learn the basics of the Caffe Latte Attack. This attack uses the Message Modification flaw in WEP to its advantage to crack the WEP key just using a client. There is no need to be anywhere near to the access point to do this.
The basic idea is to first monitor the air and find what clients are probing for. The second step is to setup a WEP fake AP using Airbase-ng. The client will connect to us and we will send an authentication success to the it. This will ensure that the client finishes the association phase and starts sending data (DHCP) requests. This is the starting point for the Caffe latte attack.
Latest from the SecurityTube Blog: