http://www.tomsnetworking.com/Sections-article118.php

"In this two part series, we will give you a step by step approach to
breaking a WEP key. The approach taken will be to standardize as many
variables as possible so that you can concentrate on the mechanics of WEP
cracking without being hindered by hardware and software bugs. The entire
attack is done with publicly available software and doesn't require special
hardware-just a few laptops and wireless cards......."

--------------


Frank Keeney
Antennas, Cables and Equipment:
http://www.wlanparts.com 

Reply via email to