| < Day Day Up > | 
|   Now that we have reviewed the theory, let's examine the practical steps for cracking WEP. The most important resource for cracking a WEP-encrypted signal is time. The longer you capture data, the more likely you are to receive a collision that will leak a key byte. Based on empirical data, there is only about a five percent chance of this happening. On average, you need to receive about five million frames to be able to crack a WEP-encrypted signal. In addition to a wireless sniffer, you'll need a series of Perl scripts available from http:// sourceforge .net/projects/wepcrack/, called (appropriately) WEPCRACK . Once you have acquired the necessary tools, perform the following steps for cracking a WEP-encrypted signal: 
  |  
| < Day Day Up > |