-WEP weaknesses are discussed in more detail in: |
||
-(In)Security of the WEP algorithm by Nikita
Borisov, Ian Goldberg, and David Wagner (http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html) |
||
-MAC address faking is very easy with same
vendor’s cards as for example most Linux drivers let set the MAC address of
the card excluding the vendor specific part |
||