{"id":96,"date":"2008-01-02T15:01:17","date_gmt":"2008-01-02T19:01:17","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2008\/01\/02\/decrypting-wireless-packets\/"},"modified":"2008-01-02T15:01:17","modified_gmt":"2008-01-02T19:01:17","slug":"decrypting-wireless-packets","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2008\/01\/02\/decrypting-wireless-packets\/","title":{"rendered":"Decrypting Wireless Packets"},"content":{"rendered":"<p>http:\/\/www.kismetwireless.net\/Forum\/General\/Messages\/1148589487.250937<\/p>\n<p><a href=\"http:\/\/www.kismetwireless.net\/Forum\/General\/Reply\/1148589487.250937\">If I&#8217;ve used kismet to create a dump file (full packet capture) with WEP encrypted data and then later learn the WEP key, how can I can I apply this key (and BSID) to decrypt the data?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/www.kismetwireless.net\/Forum\/General\/Messages\/1148589487.250937 If I&#8217;ve used kismet to create a dump file (full packet capture) with WEP encrypted data and then later learn the WEP key, how can I can I apply this key (and BSID) to decrypt the data?<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[272,274],"tags":[],"class_list":["post-96","post","type-post","status-publish","format-standard","hentry","category-digital-warfare","category-interesting-tech"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/96","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=96"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/96\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}