How to do it...

In order to crack the WEP key for an access point running the protocol, there is a process involved that requires the collection of what are known as Initialization Vectors (IVs). The problem with this process is that under normal conditions a network does not generate a lot of these items in a short period of time. Under normal conditions this means we would have to wait a prolonged period of time to get enough IVs to retrieve the network key. However, we can speed up this process by utilizing the information from our previous recipe, together with some new skills, to retrieve the key. To put it simply, we will inject packets into the network in an effort to get the access point to generate a large number of packets in a ...

Get Kali Linux Wireless Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.