Download presentation
Presentation is loading. Please wait.
Published byEric Andrews Modified over 9 years ago
1
This is my contact No.-7042550356 and this number search with google and learn my videos www.amitmishra1015.wordpress.com www.amit7042550356.weebly.com amitmishra1015@gmail.com
2
www.amitmishra015.wordpress. com
3
AMIT MISHRA -7042550356 1. WEP: the most widely used protocol, even though is heavily outdated. It was set as security standard in 1999 and over time it was shown that it has major security flaws. People still use it today even though there are other, much better protocols available. Because of its weaknesses, our WiFi password hack software can easily hack WEP network and retrieve the password in around 1 minute or less.
4
AMIT MISHRA-7042550356 WPA and WPA2: this is the replacement for the WEP protocol. The keys used by this protocol are 256 bit, a large improvement to 64 and 128 bit versions of WEP. Despite these improvements, it has been shown many times to be very vulnerable to invasion through WiFi hacking because it still had some elements of the WEP. Because of this, it can take a little bit more before you can hack WPA password, but it should be no more than 20-30% increase over hacking WEP networks. This applies to WPA2 protocol as well when using WiFi password hacker.WiFi hacking
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.