

The program retransmits the same ARP packet over and over. This, in turn, causes the access point to repeat the ARP packet with a ne- w IV. The program listens for an ARP packet then retransmits it back to the access point. The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably. One such method is ARP request replay attack. It has various methods of creating additional traffic. A feature of aircrack-ng, aireplay-ng helps us to create more traffic. Since I need more traffic to crack the WEP password fast, I can use some Jugaad to create more traffic. Just remember the more IV’s we have, the more the chances of cracking the WEP password. How? As I already told you, I will not tell you the technical jargon of this article for now. This initialization vectors play a key role in cracking the password of this Wi-Fi access point. What I am looking for is the initialization vectors that are used in cracking WEP. All the traffic belonging to the Wi-Fi access point hack me if you can will be saved in the file wep_hc_crack.cap. In the above image, you can see the clients connected to the targeted Wi-Fi Access point.
