Requirements:- 1: A Computer. 2: A Wireless Card capable of packet injection. 3:A Live installation of BackTrack either on a CD or USB stick. BackTrack Can be found http://www.backtrack-linux.org/downloads/ Create a Live USB Install http://unetbootin.sourceforge.net/ 1. boot into BackTrack using vmware 2. Click on the Backtrack applications menu -> Backtrack -> Exploitation tools -> Wireless exploitation -> WLAN Exploitation -> gerix-Wi-Fi-cracker-ng 3. Go to the configuration menu and select the wireless interface wlan0 -Click on Enable/Disable Monitor Mode (this will put the wireless card into monitor mode) -Select the newly created mon0 interface. 4. Now click on the WEP tab at the top of the window. -Click on Start sniffing and logging and leave the terminal open. -Once the wireless network you want to crack* shows up it has to be WEP encryption of course select the WEP Attacks (with clients). *note that the PWR has to be high enough to work so the closer you can get, the better. -There you click on “Associate with AP using fake auth”, wait a few seconds and click on “ARP request replay” 5. Once the Data number reaches over 10,000 you are ready to try (if the data is coming fast wait until 20 or 30,000 to be safe) and crack the key, but don't close any windows yet. -Go to the cracking tab and click on “Aircrack-ng – Decrypt WEP password” under Wep Cracking. Within a few minutes password will be cracked. ..::Feel Free To COMMENT::..