The WLAN Security Megaprimer from

WLAN Security Megaprimer Part 16: Caffe Latte Attack Basics

In this video, we will learn the basics of the Caffe Latte Attack. This attack uses the Message Modification flaw in WEP to its advantage to crack the WEP key just using a client. There is no need to be anywhere near to the access point to do this.

The basic idea is to first monitor the air and find what clients are probing for. The second step is to setup a WEP fake AP using Airbase-ng. The client will connect to us and we will send an authentication success to the it. This will ensure that the client finishes the association phase and starts sending data (DHCP) requests. This is the starting point for the Caffe latte attack.

Video Player should be visible here. If not, install / upgrade flash

Have any Questions? or would like to add a point?

Visit the video page on SecurityTube to post your questions and comments :