Hi there!
There is an idea I came up reading about wep weakness and I thought this might be a good place to share it and learn if it can be acomplished.
I understand that wep attacks are based on brute force against a fair quantity of collected packets of information, either with a passive attack or an active one increasing the traffic on the network.
My question is: what if purposedly the members of a wep network send "poisoned" or bad encrypted packets to other members, in such a way that those packets would be silently ignored ... the attacker could be mis-leaded on his brute force attack?
The poisoned packets could be sent at regular intervals (say.. 1 each random(3~5) seconds or whatever is needed) or as a response for suspicious of traffic increasing requests.
Could something like this make it harder to break wep networks or the attacker would recognize and discard those misleading packets?
Anyone with good background on the topic cares to comment?
Could it be implemented on openwrt or this type of behaviour can only be implemented on the wireless chip?
Thanks for any comments on this idea, at least I'd like to know why it wouldn't work.
I care about wep security since I've learned here that ad-hoc mesh networks with openwrt can't be secured with wpa, so wep and open network are the only options at hand. (Am I wrong?)