The AP now accepts packets that we send to it, because it's not going to ignore us now that we've successfully associated ourselves with it by using a fake authentication attack. We are now ready to inject packets into the AP and make the data increase very quickly, in order to decrypt the WEP key.
The first method of packet injection that we're going to talk about is ARP request replay. In this method, we're going to wait for an ARP packet, capture the packet, and inject it into the traffic. When we do this, the AP will be forced to create a new packet with a new IV; we'll capture the new packet, inject it back into the traffic again, and force the AP to create another packet with another IV. We will keep doing this until the amount of data is high enough to crack the WEP key.
Let's do this in Kali Linux. The first thing we&apos...