Know the code Glance wifi WEP and WPA / WPA2

Code on existing wifi WEP, WPA and WPA2, wifi hotspot code that uses WEP is easy to open with a program on the Backtrack. But for WPA / WPA2 is there who can
membukannya? Please enlighten if there could unlock (hack) code wifi WPA / WPA2.
Whatever will I obey the requirements ...
Wireless security methods Wired Equivalent Privacy (WEP)
WEP is an encryption standard security and first used in the wireless, WEP (Wired Equivalent Privacy) is a method of securing a wireless network, also known as Shared Key Authentication. Shared Key Authentication is the authentication method that requires the use of WEP. WEP encryption using a key that is inserted (by the administrator) to the client and access point. This key must match from a given access point to the client, the client entered into an access point for authentication, and WEP have 802.11b standard.

Shared Key Authentication Process:

Client has asked the association to the access point, this step is the same as the Open System Authentication.
The access point sends challenge text to the client in a transparent manner. Client will respond by encrypting the challenge text using the WEP key and sends it back to the access point.
Access point for client to respond, the access point will decrypt the encrypted response of the client to verify that the challenge text is encrypted using WEP key as appropriate. In this process, the access point will determine whether the client has given the appropriate WEP key. If the WEP key provided by the client is correct, then the access point will respond positively and directly to the client authentication. However, if the client entered the WEP key is wrong, then the access point will respond negatively and the client will not be authenticated. Thus, the client will not be authenticated and associated.

WEP has many weaknesses, among others:

The problem of weak keys, RC4 algorithm used can be solved.
WEP uses a static key Problems initialization vector (IV) WEP Issues message integrity Cyclic Redundancy Check (CRC-32)
WEP consists of two levels, the key 64 bits, and 128 bits. Actually, the secret key on 64 bit WEP key is only 40 bits, while the 24bit an Initialization Vector (IV).
Similarly, the 128-bit WEP key, secret key consists of 104bit.

The attacks on WEP weaknesses include:

The attack on the weaknesses initialization vector (IV), often referred to FMS attack. FMS stands for the name of the three inventors of weakness IV; Fluhrer, Mantin, and Shamir. This attack is done by collecting a weak fourth as much. The more weak IV obtained, the sooner discovered the key used Obtain a unique IV data obtained through packet to be processed for WEP key cracking process faster. This method is called chopping attack, first discovered by h1kari. This technique only requires IV unique thus reducing the need for IV are weak in WEP cracking.
Both of the above attacks require considerable time and packet, to shorten the time, the hackers usually do traffic injection. Traffic Injection is often done by collecting the ARP packet and then sent back to the access point. This resulted in the collection of initial vectors is easier and faster. Unlike the first and second attack, to attack traffic injection, required specification of tools and applications that start rarely found in stores, ranging from chipsets, firmware version, and the version of the driver and not infrequently have to do patching of drivers and applications.

Wireless security methods WI-FI Protected Accsess (WPA) It is a common knowledge if WEP (Wired Equivalent Privacy) is no longer able to provide a reliable wireless connection (wireless) safe from the actions of the curious or want to take advantage of what we have-known hackers jargon. Not long after the development of WEP, the fragility of the cryptography aspects emerge.
Various studies have been conducted regarding WEP and concluded that although a wireless network protected by WEP, third parties (hackers) can still be breaking into. A hacker who has a makeshift wireless equipment and software tools used to collect and analyze enough data to know the encryption key used.
Addressing weaknesses owned by WEP, has developed a new security technique called WPA (WiFi Protected Access). The technique is a model compatible with the WPA standard draft IEEE 802.11i specification. This technique has several goals in its design, the robust, interoperable, capable of being used to replace WEP, can be implemented at home or corporate users, and is available to the public as soon as possible. The existence of WPA "replace" WPE, whether true feeling of "calm" is obtained? There are many pros and cons feedback about it. Some say, WPA has a stronger encryption mechanism. However, there are pessimistic because communication lines are not safe to use, in which the technique of man-in-the-middle can be used to circumvent the process of sending data. In order for WPA goal is achieved, at least two major security development done. WPA Engineering was established to provide development data encryption WEP weak points, as well as providing user authentication that seems lost on the development of the concept of WEP.
Techniques designed WPA replaces WEP security method, which uses static security key, using TKIP (Temporal Key Integrity Protocol), which can be dynamically changed after 10,000 data packets transmitted. Protocol TKIP key will take as the starting point and then change regularly so there is no encryption key used twice. Background process is automatically carried out without being noticed by the user.
By performing encryption key regeneration approximately every five minutes, the WiFi network using WPA has been trying to slow down hackers cracking the previous key.
Although using the standard 64 and 128 bit encryption, such as WEP technology owned, WPA TKIP make more effective as an encryption mechanism. However, this decrease in throughput as complained by the wireless network as users do not see the answer you are looking for a standard document. Therefore, the problems associated with the throughput is dependent on the hardware you have, the more specific is the chipset used. The assumption at this time, if the decline in throughput occurs on the implementation of WEP, the rate of decline will be much greater if the WPA and TKIP implemented although some products claim that the decrease in throughput has been addressed, of course, with the use of chipset greater capability and capacity.
The process of WPA authentication using 802.1x and EAP (Extensible Authentication Protocol).
Taken together, these implementations will provide a solid framework on the user authentication process. The framework will make utilization of a centralized authentication server, such as RADIUS, to authenticate users before joining the wireless network. Also introduced mutual authentification, so users do not accidentally wireless network to join other networks that might steal its network identity.
Mechanism AES encryption (Advanced Encryption Standard) is likely to be adopted by the WPA user authentication mechanism. However, it seems not necessary because AES TKIP predicted able to provide a very strong encryption framework although not known for how long the toughness to survive.