wep
Classic WEP Attack
Table of Contents 1. Step 1: Monitor 2. Step 2: Packet Capture 3. Step 3: Fake Auth 4. Step 4: Classic Attack 5. Setp 5: De-Auth 6. Step 6: Crack the Key 7. Summary WEP, Wired Equivalent Privacy, has been broken for a while now and should never be used.