Summary
In this chapter, we covered the WEP protocol, the attacks that have been developed to crack the keys, the Aircrack-ng suite and other automated tools included in Kali Linux that implement these attacks.
In the next chapter, we will cover the WPA/WPA2 protocol and the tools used to attack it.