http://www.tomsnetworking.com/Sections-article120-page1.php

"In this article, we will describe how to use additional tools found on the
Auditor CD to capture traffic and use it to crack a WEP key. We'll also
describe how to use deauthentication and packet replay attacks to stimulate
the generation of wireless traffic that is a key element of reducing the
time it takes to perform a WEP key crack."




-----------

Frank Keeney
Pasadena Networks, LLC
Wireless Antennas, Cables and Equipment:
http://www.wlanparts.com

Reply via email to