Charla impartida por Alejandro Martín Bailón de Informática64 en el Asegúr@IT V que tuvo lugar en Zaragoza el 3 de Marzo de 2009 en las instalaciones del ITA.
9. Ataques en redes Wifi (WEP) 1995 “ A Class of Weak Keys in the RC4 Stream Cipher” Andrew Roos Vironix Software Laboratories 2001 “ Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer, Itsik Mantin and Adi Shamir” 2004 “ KoreK. chopchop (experimental WEP attacks)” 2007 “ Breaking 104 bit WEP in less than 60 seconds” Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin
10. Ataques en redes Wifi (WPA-WPA2) 2003 “ Weakness in Passphrase Choice in WPA Interface” Robert Moskowitz 2004 “ Weakness in the Temporal Key Hash of WPA” Webjorn Moen, Havard Raddum and Kjell J. Hole “ Offline WPA-PSK auditing tool (coWPAtty)” Joshua Wright 2008 “ Ataques a WPA/WPA2 mediante GPUs” Elcomsoft “ Practical attacks against WEP and WPA” Martin Beck, and Erik Tews