The WEP key 86:65:78:38:8F:51:7B:E0:B4:81:8A:0D:B1 was cracked in under 10 seconds. aircrack is very quick, it is the capture process using airodump that takes the majority of the time in WEP cracking.
Breaking WPA:
Once the WPA handshake has been collected (see aireplay) we can perform a dictionary attack to determine the WPA-PSK (Pre-Shared-Key)
aircrack -a 2 -w passwords.txt capture1-01.cap
aircrack Usage:
aircrack provides us with a wealth of options (type aircrack or visit project homepage for full listing): * -a [mode 1 or 2] 1=WEP, 2=WPA-PSK * -e [essid] target selection network ID * -b [bssid] target access point's MAC * -q enable quiet mode * -w [path] path to a dictionary word list (WPA only) * -n [no. bits] WEP key length (64, 128, 152 or 256) * -f [fudge no.] defaults are 5 for 64 bit WEP and 2 for 128 bit WEP
Examples:
aircrack -a 1 -n 64 capture1-01.cap
Runs aircrack against the capture1-01.cap file in 64 bit WEP cracking mode