(Go: >> BACK << -|- >> HOME <<)

SlideShare a Scribd company logo
The MFN backbone consists of a fiber-optic Gigabit Ethernet network that runs through the city
in a ring topology. The fiber-optic ring connects the hybrid fiber- coax nodes that bring coax
cabling to each neighborhood. Also connected to the ring are six data routers. Each router links
one or more Mapleland businesses to MFN via simple point-to-point connections. At the
business, the fiber-optic network enters the building and connects to a media converter. A UTP
cable connects to the media converter and typically to a 100-Mbps Ethernet switch.
The switch links the business’s computers and servers in a star topology via UTP cab
1.Draw a network map that shows the topology of the MFN and how the main components are
connected.
2.What other information would you gather to improve your map and add more detail?
3.Mapleland is considering expanding the MFN to include wireless access for its residences.
What additional investigation will you do to prepare for a citywide wireless network?
4.What security concerns do you have for the wireless network?
Design Scenario
1. Draw a network map that shows the topology of the MFN and how the main components are
connected.
2. What other information would you gather to improve your map and add more detail?
a) Port details on the routers and the switches
b) Cable lengths for the utp and fiber
c) Fiber pairs on the backbone
d) Number of clients on the network
e) Ip address used in each subnets
f) Bandwidth from isp to the clients distribution
g) Type of routers and switches capability
h) Servers back up and redundancy cables
3. Mapleland is considering expanding the MFN to include wireless access for its residences.
What additional investigation will you do to prepare for a citywide wireless network?
a) Where the users are located.
b) Characteristics of the access points’ antennas, and the location of major obstructions.
c) Checking Architectural and Environmental Constraints:
d) Checking a Site for other Wireless Installation and The initial placement of an access point
is based on an estimate of the signal loss that will occur between the access point and the users
of the access point.
e) Checking RF signal traveling through objects of various sorts can be affected by many
different problems, including the following:
I. Reflection: causes the signal to bounce back on itself. The signal
can interfere with itself in the air and affect the receiver’s capability to
discriminate between the signal and noise in the environment.
II. Absorption: Some of the electromagnetic energy of the signal can
be absorbed by the material in objects through which it passes, resulting in a
reduced signal level. Water has significant absorption properties, and objects
such as trees or thick wooden structures can have a high water content.
III. Refraction: When an RF signal passes from a medium with one
density into a medium with another density, the signal can be bent.
IV. Diffraction: results when a region through which the RF signal can
pass easily is adjacent to a region in which reflective obstructions exist.
4. What security concerns do you have for the wireless network?
a) Accidental association
When a user turns on a computer and it latches on to a wireless access point from a
neighboring company’s overlapping network, the user may not even know that this has
occurred. However, it is a security breach in that proprietary company information is exposed
and now there could exist a link from one company to the other. This is especially true if the
laptop is also hooked to a wired network.
B Malicious associations
“Malicious associations” are when wireless devices can be actively made by attackers to connect
to a company network through their cracking laptop instead of a company access point (AP).
b) Ad hoc networks
Ad hoc networks are defined as peer-to-peer networks between wireless computers that do not
have an access point in between them. While these types of networks usually have little
protection, encryption methods can be used to provide security.
c) Non-traditional networks
Non-traditional networks such as personal network Bluetooth devices are not safe from
cracking and should be regarded as a security risk. Evenbarcode readers, handheld PDAs, and
wireless printers and copiers should be secured. These non-traditional networks can be easily
overlooked by IT personnel who have narrowly focused on laptops and access points.
d) Identity theft (MAC spoofing)
Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and
identify the MAC address of a computer with network privileges.
.
e) Man-in-the-middle attacks
A man-in-the-middle attacker entices computers to log into a computer which is set up as a
soft AP (Access Point). Once this is done, the hacker connects to a real access point through
another wireless card offering a steady flow of traffic through the transparent hacking computer
to the real network. The hacker can then sniff the traffic. One type of man-in-the-middle attack
relies on security faults in challenge and handshake protocols to execute a “de-authentication
attack”.
6 Denial of service
A Denial-of-Service attack (DoS) occurs when an attacker continually bombards a targeted AP
(Access Point) or network with bogus requests, premature successful connection messages,
failure messages, and/or other commands. These cause legitimate users to not be able to get
on the network and may even cause the network to crash. These attacks rely on the abuse of
7 Network injection
In a network injection attack, a cracker can make use of access points that are exposed to non-
filtered network traffic, specifically broadcasting network traffic such as “Spanning Tree”
(802.1D), OSPF, RIP, and HSRP. The cracker injects bogus networking re-configuration
commands that affect routers, switches, and intelligent hubs. A whole network can be brought
down in this manner and require rebooting or even reprogramming of all intelligent networking
devices.
8 Caffe Latte attack
The Caffe Latte attack is another way to defeat WEP. It is not necessary for the attacker to be in
the area of the network using this exploit. By using a process that targets the Windows wireless
stack, it is possible to obtain the WEP key from a remote client.[8] By sending a flood of
encrypted ARPrequests, the assailant takes advantage of the shared key authentication and the
message modification flaws in 802.11 WEP. The attacker uses the ARP responses to obtain the
WEP key in less than 6 minutes.[9]

More Related Content

What's hot

transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
BE Smârt
 
Subnetting Principles Worksheet
Subnetting Principles WorksheetSubnetting Principles Worksheet
Subnetting Principles Worksheet
swascher
 
Computer networking
Computer networkingComputer networking
Computer networking
aslamslides
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
Concept of Network Routing Layer
Concept of Network Routing LayerConcept of Network Routing Layer
Concept of Network Routing Layer
Pawan Singh
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
Cs8591 u4
Cs8591 u4Cs8591 u4
How Email Works
How Email WorksHow Email Works
How Email Works
Sahil Babbar
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. Forouzan
Preethi T G
 
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : DetailsPURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
Soumen Santra
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
Vishal Tandel
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
Dr. C.V. Suresh Babu
 
Ch01 introduction
Ch01   introductionCh01   introduction
Ch01 introduction
Naveed Qadri
 
Wireless Geolocation
Wireless GeolocationWireless Geolocation
Wireless Geolocation
Fatema Zohora
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
Chandra Meena
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
Rahul Hada
 
Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
Shishpal Vishnoi
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
JAIGANESH SEKAR
 
Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2
Easy n Inspire L
 

What's hot (20)

transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Subnetting Principles Worksheet
Subnetting Principles WorksheetSubnetting Principles Worksheet
Subnetting Principles Worksheet
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Concept of Network Routing Layer
Concept of Network Routing LayerConcept of Network Routing Layer
Concept of Network Routing Layer
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Cs8591 u4
Cs8591 u4Cs8591 u4
Cs8591 u4
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
Fiber optik
Fiber optikFiber optik
Fiber optik
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. Forouzan
 
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : DetailsPURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
PURE ALOHA : MEDIUM ACCESS CONTROL PROTOCOL (MAC): Definition : Types : Details
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Ch01 introduction
Ch01   introductionCh01   introduction
Ch01 introduction
 
Wireless Geolocation
Wireless GeolocationWireless Geolocation
Wireless Geolocation
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2Wireless Sensor Networks UNIT-2
Wireless Sensor Networks UNIT-2
 

Viewers also liked

MOST-FAVOUREDNATION TREATMENT
MOST-FAVOUREDNATION TREATMENT MOST-FAVOUREDNATION TREATMENT
MOST-FAVOUREDNATION TREATMENT
Ira Kristina Lumban Tobing
 
MFN Status and Trade between Pakistan and India
MFN Status and Trade between Pakistan and IndiaMFN Status and Trade between Pakistan and India
MFN Status and Trade between Pakistan and India
Tabassum Naveed
 
Most Favored Nations (MFN)
Most Favored Nations (MFN)Most Favored Nations (MFN)
Most Favored Nations (MFN)
Vishak G
 
Pakistan India trade
Pakistan India tradePakistan India trade
Pakistan India trade
Ejaz Dilshad
 
Most favoured nations
Most favoured nationsMost favoured nations
Most favoured nations
Isha Joshi
 
Consultancy technology transfer tax perspective
Consultancy technology transfer   tax perspectiveConsultancy technology transfer   tax perspective
Consultancy technology transfer tax perspective
Altacit Global
 
Star bucks- goals and objective and visions
Star bucks- goals and objective and visions Star bucks- goals and objective and visions
Star bucks- goals and objective and visions
Gurkirat Dhaliwal
 
Shelley presentation on mfn
Shelley presentation on mfnShelley presentation on mfn
Shelley presentation on mfn
Altacit Global
 
mc donalds marketing goals
mc donalds marketing goals mc donalds marketing goals
mc donalds marketing goals
Gurkirat Dhaliwal
 
Japanese automakers and car makers
Japanese automakers and car makers Japanese automakers and car makers
Japanese automakers and car makers
Gurkirat Dhaliwal
 
mahindra & mahindra automakers
mahindra & mahindra automakersmahindra & mahindra automakers
mahindra & mahindra automakers
Gurkirat Dhaliwal
 

Viewers also liked (11)

MOST-FAVOUREDNATION TREATMENT
MOST-FAVOUREDNATION TREATMENT MOST-FAVOUREDNATION TREATMENT
MOST-FAVOUREDNATION TREATMENT
 
MFN Status and Trade between Pakistan and India
MFN Status and Trade between Pakistan and IndiaMFN Status and Trade between Pakistan and India
MFN Status and Trade between Pakistan and India
 
Most Favored Nations (MFN)
Most Favored Nations (MFN)Most Favored Nations (MFN)
Most Favored Nations (MFN)
 
Pakistan India trade
Pakistan India tradePakistan India trade
Pakistan India trade
 
Most favoured nations
Most favoured nationsMost favoured nations
Most favoured nations
 
Consultancy technology transfer tax perspective
Consultancy technology transfer   tax perspectiveConsultancy technology transfer   tax perspective
Consultancy technology transfer tax perspective
 
Star bucks- goals and objective and visions
Star bucks- goals and objective and visions Star bucks- goals and objective and visions
Star bucks- goals and objective and visions
 
Shelley presentation on mfn
Shelley presentation on mfnShelley presentation on mfn
Shelley presentation on mfn
 
mc donalds marketing goals
mc donalds marketing goals mc donalds marketing goals
mc donalds marketing goals
 
Japanese automakers and car makers
Japanese automakers and car makers Japanese automakers and car makers
Japanese automakers and car makers
 
mahindra & mahindra automakers
mahindra & mahindra automakersmahindra & mahindra automakers
mahindra & mahindra automakers
 

Similar to The mfn 3

Wireless security
Wireless securityWireless security
Wireless security
Salma Elhag
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
wilfredo dela cerna
 
Wireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-isWireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-is
ssuser5b84591
 
Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01
Md. Abdur Rahim Khan
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
Bijay Bista
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
qhawengcongo
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
qhawengcongo
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
Common network devices
Common network devicesCommon network devices
Common network devices
Raza Muhammad Jamali
 
Ist264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalIst264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournal
Harold Sowards
 
Lan
LanLan
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
AlidHasan4
 
Networking
NetworkingNetworking
Networking
Joseph Zacharia
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
tardeep
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
aravindhawan
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
Iaetsd Iaetsd
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
RAVI RAJ
 

Similar to The mfn 3 (20)

Wireless security
Wireless securityWireless security
Wireless security
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Wireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-isWireless deployment strategies in WNS-is
Wireless deployment strategies in WNS-is
 
Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Common network devices
Common network devicesCommon network devices
Common network devices
 
Ist264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalIst264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournal
 
Lan
LanLan
Lan
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 
Networking
NetworkingNetworking
Networking
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 

The mfn 3

  • 1. The MFN backbone consists of a fiber-optic Gigabit Ethernet network that runs through the city in a ring topology. The fiber-optic ring connects the hybrid fiber- coax nodes that bring coax cabling to each neighborhood. Also connected to the ring are six data routers. Each router links one or more Mapleland businesses to MFN via simple point-to-point connections. At the business, the fiber-optic network enters the building and connects to a media converter. A UTP cable connects to the media converter and typically to a 100-Mbps Ethernet switch. The switch links the business’s computers and servers in a star topology via UTP cab 1.Draw a network map that shows the topology of the MFN and how the main components are connected. 2.What other information would you gather to improve your map and add more detail? 3.Mapleland is considering expanding the MFN to include wireless access for its residences. What additional investigation will you do to prepare for a citywide wireless network? 4.What security concerns do you have for the wireless network? Design Scenario 1. Draw a network map that shows the topology of the MFN and how the main components are connected.
  • 2. 2. What other information would you gather to improve your map and add more detail?
  • 3. a) Port details on the routers and the switches b) Cable lengths for the utp and fiber c) Fiber pairs on the backbone d) Number of clients on the network e) Ip address used in each subnets f) Bandwidth from isp to the clients distribution g) Type of routers and switches capability h) Servers back up and redundancy cables 3. Mapleland is considering expanding the MFN to include wireless access for its residences. What additional investigation will you do to prepare for a citywide wireless network? a) Where the users are located. b) Characteristics of the access points’ antennas, and the location of major obstructions. c) Checking Architectural and Environmental Constraints: d) Checking a Site for other Wireless Installation and The initial placement of an access point is based on an estimate of the signal loss that will occur between the access point and the users of the access point. e) Checking RF signal traveling through objects of various sorts can be affected by many different problems, including the following: I. Reflection: causes the signal to bounce back on itself. The signal can interfere with itself in the air and affect the receiver’s capability to discriminate between the signal and noise in the environment. II. Absorption: Some of the electromagnetic energy of the signal can be absorbed by the material in objects through which it passes, resulting in a
  • 4. reduced signal level. Water has significant absorption properties, and objects such as trees or thick wooden structures can have a high water content. III. Refraction: When an RF signal passes from a medium with one density into a medium with another density, the signal can be bent. IV. Diffraction: results when a region through which the RF signal can pass easily is adjacent to a region in which reflective obstructions exist. 4. What security concerns do you have for the wireless network? a) Accidental association When a user turns on a computer and it latches on to a wireless access point from a neighboring company’s overlapping network, the user may not even know that this has occurred. However, it is a security breach in that proprietary company information is exposed and now there could exist a link from one company to the other. This is especially true if the laptop is also hooked to a wired network. B Malicious associations “Malicious associations” are when wireless devices can be actively made by attackers to connect to a company network through their cracking laptop instead of a company access point (AP). b) Ad hoc networks Ad hoc networks are defined as peer-to-peer networks between wireless computers that do not have an access point in between them. While these types of networks usually have little protection, encryption methods can be used to provide security. c) Non-traditional networks Non-traditional networks such as personal network Bluetooth devices are not safe from cracking and should be regarded as a security risk. Evenbarcode readers, handheld PDAs, and wireless printers and copiers should be secured. These non-traditional networks can be easily overlooked by IT personnel who have narrowly focused on laptops and access points. d) Identity theft (MAC spoofing)
  • 5. Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and identify the MAC address of a computer with network privileges. . e) Man-in-the-middle attacks A man-in-the-middle attacker entices computers to log into a computer which is set up as a soft AP (Access Point). Once this is done, the hacker connects to a real access point through another wireless card offering a steady flow of traffic through the transparent hacking computer to the real network. The hacker can then sniff the traffic. One type of man-in-the-middle attack relies on security faults in challenge and handshake protocols to execute a “de-authentication attack”. 6 Denial of service A Denial-of-Service attack (DoS) occurs when an attacker continually bombards a targeted AP (Access Point) or network with bogus requests, premature successful connection messages, failure messages, and/or other commands. These cause legitimate users to not be able to get on the network and may even cause the network to crash. These attacks rely on the abuse of 7 Network injection In a network injection attack, a cracker can make use of access points that are exposed to non- filtered network traffic, specifically broadcasting network traffic such as “Spanning Tree” (802.1D), OSPF, RIP, and HSRP. The cracker injects bogus networking re-configuration commands that affect routers, switches, and intelligent hubs. A whole network can be brought down in this manner and require rebooting or even reprogramming of all intelligent networking devices. 8 Caffe Latte attack The Caffe Latte attack is another way to defeat WEP. It is not necessary for the attacker to be in the area of the network using this exploit. By using a process that targets the Windows wireless stack, it is possible to obtain the WEP key from a remote client.[8] By sending a flood of encrypted ARPrequests, the assailant takes advantage of the shared key authentication and the message modification flaws in 802.11 WEP. The attacker uses the ARP responses to obtain the WEP key in less than 6 minutes.[9]