
The bits in the encrypted stream and the checksum can be modified by the attacker so that the packet is accepted by the authentication system. CRC32 integrity check can be compromised by capturing at least two packets.

WEP works by encrypting the data been transmitted over the network to keep it safe from eavesdropping. Its goal was to provide the privacy equivalent to that provided by wired networks. It was developed for IEEE 802.11 WLAN standards. WEP is the acronym for Wired Equivalent Privacy. Let’s look at some of the most commonly used authentication techniques. Since the network is easily accessible to everyone with a wireless network enabled device, most networks are password protected. If it is password protected, then you will need the password to gain access.

If the network is not password protected, then you just have to click on connect. Most devices (if the wireless network option is turned on) will provide you with a list of available networks.

You will also need to be within the transmission radius of a wireless network access point. You will need a wireless network enabled device such as a laptop, tablet, smartphones, etc.
