Quote:
Originally Posted by nukemknight
Very slim chance considering FMS uses WPA. Thats the purpose of the radio kiosk that all teams must use to re-program their radios at each event. The WPA keys are randomly generated by FMS at each event so you team's key will change between each event. The WPA key list is not available to teams.
|
The fact that it is WEP does NOT make it secure... in fact, some people joke that it is easier to crack WEP at someone's houls (and faster) than to get up and ask them. All commercial wifi setups have flaws. For example, I have seen backtrack 5 crack my home wifi (linksys a/b/g router, set to WEP temporarily) in under two hours. Via a laptop. With WPA2, it took 4 (used the WiFi protected setup vulnerability). A sufficiently determined team COULD crack the encryption in a relatively short timeframe. Or, they could use any of the other specialized linux penetration testing distros. And if the WPA list key is not avaliable to teams, how hard would it be to imitate the FMS setup? (change MAC address on router, set up a network, log attempted connections and passwords)
Yes, I seem to have put too much thought into this. I do not intend to be the kind of person who would do this, however.