http://www.tomsnetworking.com/Sections-article120-page1.php
"In this article, we will describe how to use additional tools found on the Auditor CD to capture traffic and use it to crack a WEP key. We'll also describe how to use deauthentication and packet replay attacks to stimulate the generation of wireless traffic that is a key element of reducing the time it takes to perform a WEP key crack." ----------- Frank Keeney Pasadena Networks, LLC Wireless Antennas, Cables and Equipment: http://www.wlanparts.com
