What is the use of cracking it, if the key changes after some time?
Usually with WEP you needed bout 100.000 IV packets for a 40bit key
with bout 1.000.000 IV for 104bit
With WPA PSK you crack that by listing in and trying to catch the 4way handshake,
with this data you then try a dictionary attack to brute-force your way in (so don't use the SSID as PSK)
WPA - EAP (in all its glory and variaties LEAP, -TLS -TTLS, PEAP)
have all their own weakness
EAP - Man-in-the-Middle (MitM from now), Dictionary and Hijacking the connection (and it doesn't use dynamic keys)
LEAP - Dictionary
EAP-TLS - ... no I am not missing something - to my knowledge none are knows so far
EAP-TTLS - MitM
PEAP - MitM
So after this short excursion into EAP I hope you can answer your question for yourself ...
A friend working in that area once said, with WEP and ACL you can keep bout 95% out, with WPA-PSK bout 98% - other WPA methods will raise it to about 99.9%
But it is the last 0.1% you fear
|